]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/ipv4/route.c
net: skb->rtable accessor
[net-next-2.6.git] / net / ipv4 / route.c
CommitLineData
1da177e4
LT
1/*
2 * INET An implementation of the TCP/IP protocol suite for the LINUX
3 * operating system. INET is implemented using the BSD Socket
4 * interface as the means of communication with the user level.
5 *
6 * ROUTE - implementation of the IP router.
7 *
02c30a84 8 * Authors: Ross Biro
1da177e4
LT
9 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
10 * Alan Cox, <gw4pts@gw4pts.ampr.org>
11 * Linus Torvalds, <Linus.Torvalds@helsinki.fi>
12 * Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
13 *
14 * Fixes:
15 * Alan Cox : Verify area fixes.
16 * Alan Cox : cli() protects routing changes
17 * Rui Oliveira : ICMP routing table updates
18 * (rco@di.uminho.pt) Routing table insertion and update
19 * Linus Torvalds : Rewrote bits to be sensible
20 * Alan Cox : Added BSD route gw semantics
e905a9ed 21 * Alan Cox : Super /proc >4K
1da177e4
LT
22 * Alan Cox : MTU in route table
23 * Alan Cox : MSS actually. Also added the window
24 * clamper.
25 * Sam Lantinga : Fixed route matching in rt_del()
26 * Alan Cox : Routing cache support.
27 * Alan Cox : Removed compatibility cruft.
28 * Alan Cox : RTF_REJECT support.
29 * Alan Cox : TCP irtt support.
30 * Jonathan Naylor : Added Metric support.
31 * Miquel van Smoorenburg : BSD API fixes.
32 * Miquel van Smoorenburg : Metrics.
33 * Alan Cox : Use __u32 properly
34 * Alan Cox : Aligned routing errors more closely with BSD
35 * our system is still very different.
36 * Alan Cox : Faster /proc handling
37 * Alexey Kuznetsov : Massive rework to support tree based routing,
38 * routing caches and better behaviour.
e905a9ed 39 *
1da177e4
LT
40 * Olaf Erb : irtt wasn't being copied right.
41 * Bjorn Ekwall : Kerneld route support.
42 * Alan Cox : Multicast fixed (I hope)
43 * Pavel Krauz : Limited broadcast fixed
44 * Mike McLagan : Routing by source
45 * Alexey Kuznetsov : End of old history. Split to fib.c and
46 * route.c and rewritten from scratch.
47 * Andi Kleen : Load-limit warning messages.
48 * Vitaly E. Lavrov : Transparent proxy revived after year coma.
49 * Vitaly E. Lavrov : Race condition in ip_route_input_slow.
50 * Tobias Ringstrom : Uninitialized res.type in ip_route_output_slow.
51 * Vladimir V. Ivanov : IP rule info (flowid) is really useful.
52 * Marc Boucher : routing by fwmark
53 * Robert Olsson : Added rt_cache statistics
54 * Arnaldo C. Melo : Convert proc stuff to seq_file
bb1d23b0 55 * Eric Dumazet : hashed spinlocks and rt_check_expire() fixes.
cef2685e
IS
56 * Ilia Sotnikov : Ignore TOS on PMTUD and Redirect
57 * Ilia Sotnikov : Removed TOS from hash calculations
1da177e4
LT
58 *
59 * This program is free software; you can redistribute it and/or
60 * modify it under the terms of the GNU General Public License
61 * as published by the Free Software Foundation; either version
62 * 2 of the License, or (at your option) any later version.
63 */
64
1da177e4
LT
65#include <linux/module.h>
66#include <asm/uaccess.h>
67#include <asm/system.h>
68#include <linux/bitops.h>
69#include <linux/types.h>
70#include <linux/kernel.h>
1da177e4 71#include <linux/mm.h>
424c4b70 72#include <linux/bootmem.h>
1da177e4
LT
73#include <linux/string.h>
74#include <linux/socket.h>
75#include <linux/sockios.h>
76#include <linux/errno.h>
77#include <linux/in.h>
78#include <linux/inet.h>
79#include <linux/netdevice.h>
80#include <linux/proc_fs.h>
81#include <linux/init.h>
39c90ece 82#include <linux/workqueue.h>
1da177e4 83#include <linux/skbuff.h>
1da177e4
LT
84#include <linux/inetdevice.h>
85#include <linux/igmp.h>
86#include <linux/pkt_sched.h>
87#include <linux/mroute.h>
88#include <linux/netfilter_ipv4.h>
89#include <linux/random.h>
90#include <linux/jhash.h>
91#include <linux/rcupdate.h>
92#include <linux/times.h>
352e512c 93#include <net/dst.h>
457c4cbc 94#include <net/net_namespace.h>
1da177e4
LT
95#include <net/protocol.h>
96#include <net/ip.h>
97#include <net/route.h>
98#include <net/inetpeer.h>
99#include <net/sock.h>
100#include <net/ip_fib.h>
101#include <net/arp.h>
102#include <net/tcp.h>
103#include <net/icmp.h>
104#include <net/xfrm.h>
8d71740c 105#include <net/netevent.h>
63f3444f 106#include <net/rtnetlink.h>
1da177e4
LT
107#ifdef CONFIG_SYSCTL
108#include <linux/sysctl.h>
109#endif
110
111#define RT_FL_TOS(oldflp) \
112 ((u32)(oldflp->fl4_tos & (IPTOS_RT_MASK | RTO_ONLINK)))
113
114#define IP_MAX_MTU 0xFFF0
115
116#define RT_GC_TIMEOUT (300*HZ)
117
1da177e4 118static int ip_rt_max_size;
817bc4db
SH
119static int ip_rt_gc_timeout __read_mostly = RT_GC_TIMEOUT;
120static int ip_rt_gc_interval __read_mostly = 60 * HZ;
121static int ip_rt_gc_min_interval __read_mostly = HZ / 2;
122static int ip_rt_redirect_number __read_mostly = 9;
123static int ip_rt_redirect_load __read_mostly = HZ / 50;
124static int ip_rt_redirect_silence __read_mostly = ((HZ / 50) << (9 + 1));
125static int ip_rt_error_cost __read_mostly = HZ;
126static int ip_rt_error_burst __read_mostly = 5 * HZ;
127static int ip_rt_gc_elasticity __read_mostly = 8;
128static int ip_rt_mtu_expires __read_mostly = 10 * 60 * HZ;
129static int ip_rt_min_pmtu __read_mostly = 512 + 20 + 20;
130static int ip_rt_min_advmss __read_mostly = 256;
131static int ip_rt_secret_interval __read_mostly = 10 * 60 * HZ;
1080d709 132static int rt_chain_length_max __read_mostly = 20;
1da177e4 133
beb659bd
ED
134static void rt_worker_func(struct work_struct *work);
135static DECLARE_DELAYED_WORK(expires_work, rt_worker_func);
1da177e4
LT
136
137/*
138 * Interface to generic destination cache.
139 */
140
141static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie);
142static void ipv4_dst_destroy(struct dst_entry *dst);
143static void ipv4_dst_ifdown(struct dst_entry *dst,
144 struct net_device *dev, int how);
145static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst);
146static void ipv4_link_failure(struct sk_buff *skb);
147static void ip_rt_update_pmtu(struct dst_entry *dst, u32 mtu);
569d3645 148static int rt_garbage_collect(struct dst_ops *ops);
1080d709 149static void rt_emergency_hash_rebuild(struct net *net);
1da177e4
LT
150
151
152static struct dst_ops ipv4_dst_ops = {
153 .family = AF_INET,
09640e63 154 .protocol = cpu_to_be16(ETH_P_IP),
1da177e4
LT
155 .gc = rt_garbage_collect,
156 .check = ipv4_dst_check,
157 .destroy = ipv4_dst_destroy,
158 .ifdown = ipv4_dst_ifdown,
159 .negative_advice = ipv4_negative_advice,
160 .link_failure = ipv4_link_failure,
161 .update_pmtu = ip_rt_update_pmtu,
1ac06e03 162 .local_out = __ip_local_out,
e2422970 163 .entries = ATOMIC_INIT(0),
1da177e4
LT
164};
165
166#define ECN_OR_COST(class) TC_PRIO_##class
167
4839c52b 168const __u8 ip_tos2prio[16] = {
1da177e4
LT
169 TC_PRIO_BESTEFFORT,
170 ECN_OR_COST(FILLER),
171 TC_PRIO_BESTEFFORT,
172 ECN_OR_COST(BESTEFFORT),
173 TC_PRIO_BULK,
174 ECN_OR_COST(BULK),
175 TC_PRIO_BULK,
176 ECN_OR_COST(BULK),
177 TC_PRIO_INTERACTIVE,
178 ECN_OR_COST(INTERACTIVE),
179 TC_PRIO_INTERACTIVE,
180 ECN_OR_COST(INTERACTIVE),
181 TC_PRIO_INTERACTIVE_BULK,
182 ECN_OR_COST(INTERACTIVE_BULK),
183 TC_PRIO_INTERACTIVE_BULK,
184 ECN_OR_COST(INTERACTIVE_BULK)
185};
186
187
188/*
189 * Route cache.
190 */
191
192/* The locking scheme is rather straight forward:
193 *
194 * 1) Read-Copy Update protects the buckets of the central route hash.
195 * 2) Only writers remove entries, and they hold the lock
196 * as they look at rtable reference counts.
197 * 3) Only readers acquire references to rtable entries,
198 * they do so with atomic increments and with the
199 * lock held.
200 */
201
202struct rt_hash_bucket {
203 struct rtable *chain;
22c047cc 204};
1080d709 205
8a25d5de
IM
206#if defined(CONFIG_SMP) || defined(CONFIG_DEBUG_SPINLOCK) || \
207 defined(CONFIG_PROVE_LOCKING)
22c047cc
ED
208/*
209 * Instead of using one spinlock for each rt_hash_bucket, we use a table of spinlocks
210 * The size of this table is a power of two and depends on the number of CPUS.
62051200 211 * (on lockdep we have a quite big spinlock_t, so keep the size down there)
22c047cc 212 */
62051200
IM
213#ifdef CONFIG_LOCKDEP
214# define RT_HASH_LOCK_SZ 256
22c047cc 215#else
62051200
IM
216# if NR_CPUS >= 32
217# define RT_HASH_LOCK_SZ 4096
218# elif NR_CPUS >= 16
219# define RT_HASH_LOCK_SZ 2048
220# elif NR_CPUS >= 8
221# define RT_HASH_LOCK_SZ 1024
222# elif NR_CPUS >= 4
223# define RT_HASH_LOCK_SZ 512
224# else
225# define RT_HASH_LOCK_SZ 256
226# endif
22c047cc
ED
227#endif
228
229static spinlock_t *rt_hash_locks;
230# define rt_hash_lock_addr(slot) &rt_hash_locks[(slot) & (RT_HASH_LOCK_SZ - 1)]
1ff1cc20
PE
231
232static __init void rt_hash_lock_init(void)
233{
234 int i;
235
236 rt_hash_locks = kmalloc(sizeof(spinlock_t) * RT_HASH_LOCK_SZ,
237 GFP_KERNEL);
238 if (!rt_hash_locks)
239 panic("IP: failed to allocate rt_hash_locks\n");
240
241 for (i = 0; i < RT_HASH_LOCK_SZ; i++)
242 spin_lock_init(&rt_hash_locks[i]);
243}
22c047cc
ED
244#else
245# define rt_hash_lock_addr(slot) NULL
1ff1cc20
PE
246
247static inline void rt_hash_lock_init(void)
248{
249}
22c047cc 250#endif
1da177e4 251
817bc4db
SH
252static struct rt_hash_bucket *rt_hash_table __read_mostly;
253static unsigned rt_hash_mask __read_mostly;
254static unsigned int rt_hash_log __read_mostly;
1da177e4 255
2f970d83 256static DEFINE_PER_CPU(struct rt_cache_stat, rt_cache_stat);
dbd2915c 257#define RT_CACHE_STAT_INC(field) \
bfe5d834 258 (__raw_get_cpu_var(rt_cache_stat).field++)
1da177e4 259
b00180de
DL
260static inline unsigned int rt_hash(__be32 daddr, __be32 saddr, int idx,
261 int genid)
1da177e4 262{
1294fc4a
SH
263 return jhash_3words((__force u32)(__be32)(daddr),
264 (__force u32)(__be32)(saddr),
b00180de 265 idx, genid)
29e75252 266 & rt_hash_mask;
1da177e4
LT
267}
268
e84f84f2
DL
269static inline int rt_genid(struct net *net)
270{
271 return atomic_read(&net->ipv4.rt_genid);
272}
273
1da177e4
LT
274#ifdef CONFIG_PROC_FS
275struct rt_cache_iter_state {
a75e936f 276 struct seq_net_private p;
1da177e4 277 int bucket;
29e75252 278 int genid;
1da177e4
LT
279};
280
1218854a 281static struct rtable *rt_cache_get_first(struct seq_file *seq)
1da177e4 282{
1218854a 283 struct rt_cache_iter_state *st = seq->private;
1da177e4 284 struct rtable *r = NULL;
1da177e4
LT
285
286 for (st->bucket = rt_hash_mask; st->bucket >= 0; --st->bucket) {
a6272665
ED
287 if (!rt_hash_table[st->bucket].chain)
288 continue;
1da177e4 289 rcu_read_lock_bh();
29e75252
ED
290 r = rcu_dereference(rt_hash_table[st->bucket].chain);
291 while (r) {
1218854a 292 if (dev_net(r->u.dst.dev) == seq_file_net(seq) &&
a75e936f 293 r->rt_genid == st->genid)
29e75252
ED
294 return r;
295 r = rcu_dereference(r->u.dst.rt_next);
296 }
1da177e4
LT
297 rcu_read_unlock_bh();
298 }
29e75252 299 return r;
1da177e4
LT
300}
301
1218854a 302static struct rtable *__rt_cache_get_next(struct seq_file *seq,
642d6318 303 struct rtable *r)
1da177e4 304{
1218854a 305 struct rt_cache_iter_state *st = seq->private;
a6272665 306
093c2ca4 307 r = r->u.dst.rt_next;
1da177e4
LT
308 while (!r) {
309 rcu_read_unlock_bh();
a6272665
ED
310 do {
311 if (--st->bucket < 0)
312 return NULL;
313 } while (!rt_hash_table[st->bucket].chain);
1da177e4
LT
314 rcu_read_lock_bh();
315 r = rt_hash_table[st->bucket].chain;
316 }
0bcceadc 317 return rcu_dereference(r);
1da177e4
LT
318}
319
1218854a 320static struct rtable *rt_cache_get_next(struct seq_file *seq,
642d6318
DL
321 struct rtable *r)
322{
1218854a
YH
323 struct rt_cache_iter_state *st = seq->private;
324 while ((r = __rt_cache_get_next(seq, r)) != NULL) {
325 if (dev_net(r->u.dst.dev) != seq_file_net(seq))
a75e936f 326 continue;
642d6318
DL
327 if (r->rt_genid == st->genid)
328 break;
329 }
330 return r;
331}
332
1218854a 333static struct rtable *rt_cache_get_idx(struct seq_file *seq, loff_t pos)
1da177e4 334{
1218854a 335 struct rtable *r = rt_cache_get_first(seq);
1da177e4
LT
336
337 if (r)
1218854a 338 while (pos && (r = rt_cache_get_next(seq, r)))
1da177e4
LT
339 --pos;
340 return pos ? NULL : r;
341}
342
343static void *rt_cache_seq_start(struct seq_file *seq, loff_t *pos)
344{
29e75252 345 struct rt_cache_iter_state *st = seq->private;
29e75252 346 if (*pos)
1218854a 347 return rt_cache_get_idx(seq, *pos - 1);
e84f84f2 348 st->genid = rt_genid(seq_file_net(seq));
29e75252 349 return SEQ_START_TOKEN;
1da177e4
LT
350}
351
352static void *rt_cache_seq_next(struct seq_file *seq, void *v, loff_t *pos)
353{
29e75252 354 struct rtable *r;
1da177e4
LT
355
356 if (v == SEQ_START_TOKEN)
1218854a 357 r = rt_cache_get_first(seq);
1da177e4 358 else
1218854a 359 r = rt_cache_get_next(seq, v);
1da177e4
LT
360 ++*pos;
361 return r;
362}
363
364static void rt_cache_seq_stop(struct seq_file *seq, void *v)
365{
366 if (v && v != SEQ_START_TOKEN)
367 rcu_read_unlock_bh();
368}
369
370static int rt_cache_seq_show(struct seq_file *seq, void *v)
371{
372 if (v == SEQ_START_TOKEN)
373 seq_printf(seq, "%-127s\n",
374 "Iface\tDestination\tGateway \tFlags\t\tRefCnt\tUse\t"
375 "Metric\tSource\t\tMTU\tWindow\tIRTT\tTOS\tHHRef\t"
376 "HHUptod\tSpecDst");
377 else {
378 struct rtable *r = v;
5e659e4c 379 int len;
1da177e4 380
5e659e4c
PE
381 seq_printf(seq, "%s\t%08lX\t%08lX\t%8X\t%d\t%u\t%d\t"
382 "%08lX\t%d\t%u\t%u\t%02X\t%d\t%1d\t%08X%n",
1da177e4
LT
383 r->u.dst.dev ? r->u.dst.dev->name : "*",
384 (unsigned long)r->rt_dst, (unsigned long)r->rt_gateway,
385 r->rt_flags, atomic_read(&r->u.dst.__refcnt),
386 r->u.dst.__use, 0, (unsigned long)r->rt_src,
387 (dst_metric(&r->u.dst, RTAX_ADVMSS) ?
388 (int)dst_metric(&r->u.dst, RTAX_ADVMSS) + 40 : 0),
389 dst_metric(&r->u.dst, RTAX_WINDOW),
390 (int)((dst_metric(&r->u.dst, RTAX_RTT) >> 3) +
391 dst_metric(&r->u.dst, RTAX_RTTVAR)),
392 r->fl.fl4_tos,
393 r->u.dst.hh ? atomic_read(&r->u.dst.hh->hh_refcnt) : -1,
394 r->u.dst.hh ? (r->u.dst.hh->hh_output ==
395 dev_queue_xmit) : 0,
5e659e4c
PE
396 r->rt_spec_dst, &len);
397
398 seq_printf(seq, "%*s\n", 127 - len, "");
e905a9ed
YH
399 }
400 return 0;
1da177e4
LT
401}
402
f690808e 403static const struct seq_operations rt_cache_seq_ops = {
1da177e4
LT
404 .start = rt_cache_seq_start,
405 .next = rt_cache_seq_next,
406 .stop = rt_cache_seq_stop,
407 .show = rt_cache_seq_show,
408};
409
410static int rt_cache_seq_open(struct inode *inode, struct file *file)
411{
a75e936f 412 return seq_open_net(inode, file, &rt_cache_seq_ops,
cf7732e4 413 sizeof(struct rt_cache_iter_state));
1da177e4
LT
414}
415
9a32144e 416static const struct file_operations rt_cache_seq_fops = {
1da177e4
LT
417 .owner = THIS_MODULE,
418 .open = rt_cache_seq_open,
419 .read = seq_read,
420 .llseek = seq_lseek,
a75e936f 421 .release = seq_release_net,
1da177e4
LT
422};
423
424
425static void *rt_cpu_seq_start(struct seq_file *seq, loff_t *pos)
426{
427 int cpu;
428
429 if (*pos == 0)
430 return SEQ_START_TOKEN;
431
0f23174a 432 for (cpu = *pos-1; cpu < nr_cpu_ids; ++cpu) {
1da177e4
LT
433 if (!cpu_possible(cpu))
434 continue;
435 *pos = cpu+1;
2f970d83 436 return &per_cpu(rt_cache_stat, cpu);
1da177e4
LT
437 }
438 return NULL;
439}
440
441static void *rt_cpu_seq_next(struct seq_file *seq, void *v, loff_t *pos)
442{
443 int cpu;
444
0f23174a 445 for (cpu = *pos; cpu < nr_cpu_ids; ++cpu) {
1da177e4
LT
446 if (!cpu_possible(cpu))
447 continue;
448 *pos = cpu+1;
2f970d83 449 return &per_cpu(rt_cache_stat, cpu);
1da177e4
LT
450 }
451 return NULL;
e905a9ed 452
1da177e4
LT
453}
454
455static void rt_cpu_seq_stop(struct seq_file *seq, void *v)
456{
457
458}
459
460static int rt_cpu_seq_show(struct seq_file *seq, void *v)
461{
462 struct rt_cache_stat *st = v;
463
464 if (v == SEQ_START_TOKEN) {
5bec0039 465 seq_printf(seq, "entries in_hit in_slow_tot in_slow_mc in_no_route in_brd in_martian_dst in_martian_src out_hit out_slow_tot out_slow_mc gc_total gc_ignored gc_goal_miss gc_dst_overflow in_hlist_search out_hlist_search\n");
1da177e4
LT
466 return 0;
467 }
e905a9ed 468
1da177e4
LT
469 seq_printf(seq,"%08x %08x %08x %08x %08x %08x %08x %08x "
470 " %08x %08x %08x %08x %08x %08x %08x %08x %08x \n",
471 atomic_read(&ipv4_dst_ops.entries),
472 st->in_hit,
473 st->in_slow_tot,
474 st->in_slow_mc,
475 st->in_no_route,
476 st->in_brd,
477 st->in_martian_dst,
478 st->in_martian_src,
479
480 st->out_hit,
481 st->out_slow_tot,
e905a9ed 482 st->out_slow_mc,
1da177e4
LT
483
484 st->gc_total,
485 st->gc_ignored,
486 st->gc_goal_miss,
487 st->gc_dst_overflow,
488 st->in_hlist_search,
489 st->out_hlist_search
490 );
491 return 0;
492}
493
f690808e 494static const struct seq_operations rt_cpu_seq_ops = {
1da177e4
LT
495 .start = rt_cpu_seq_start,
496 .next = rt_cpu_seq_next,
497 .stop = rt_cpu_seq_stop,
498 .show = rt_cpu_seq_show,
499};
500
501
502static int rt_cpu_seq_open(struct inode *inode, struct file *file)
503{
504 return seq_open(file, &rt_cpu_seq_ops);
505}
506
9a32144e 507static const struct file_operations rt_cpu_seq_fops = {
1da177e4
LT
508 .owner = THIS_MODULE,
509 .open = rt_cpu_seq_open,
510 .read = seq_read,
511 .llseek = seq_lseek,
512 .release = seq_release,
513};
514
78c686e9
PE
515#ifdef CONFIG_NET_CLS_ROUTE
516static int ip_rt_acct_read(char *buffer, char **start, off_t offset,
517 int length, int *eof, void *data)
518{
519 unsigned int i;
520
521 if ((offset & 3) || (length & 3))
522 return -EIO;
523
524 if (offset >= sizeof(struct ip_rt_acct) * 256) {
525 *eof = 1;
526 return 0;
527 }
528
529 if (offset + length >= sizeof(struct ip_rt_acct) * 256) {
530 length = sizeof(struct ip_rt_acct) * 256 - offset;
531 *eof = 1;
532 }
533
534 offset /= sizeof(u32);
535
536 if (length > 0) {
537 u32 *dst = (u32 *) buffer;
538
539 *start = buffer;
540 memset(dst, 0, length);
541
542 for_each_possible_cpu(i) {
543 unsigned int j;
544 u32 *src;
545
546 src = ((u32 *) per_cpu_ptr(ip_rt_acct, i)) + offset;
547 for (j = 0; j < length/4; j++)
548 dst[j] += src[j];
549 }
550 }
551 return length;
552}
553#endif
107f1634 554
73b38711 555static int __net_init ip_rt_do_proc_init(struct net *net)
107f1634
PE
556{
557 struct proc_dir_entry *pde;
558
559 pde = proc_net_fops_create(net, "rt_cache", S_IRUGO,
560 &rt_cache_seq_fops);
561 if (!pde)
562 goto err1;
563
77020720
WC
564 pde = proc_create("rt_cache", S_IRUGO,
565 net->proc_net_stat, &rt_cpu_seq_fops);
107f1634
PE
566 if (!pde)
567 goto err2;
568
107f1634
PE
569#ifdef CONFIG_NET_CLS_ROUTE
570 pde = create_proc_read_entry("rt_acct", 0, net->proc_net,
571 ip_rt_acct_read, NULL);
572 if (!pde)
573 goto err3;
574#endif
575 return 0;
576
577#ifdef CONFIG_NET_CLS_ROUTE
578err3:
579 remove_proc_entry("rt_cache", net->proc_net_stat);
580#endif
581err2:
582 remove_proc_entry("rt_cache", net->proc_net);
583err1:
584 return -ENOMEM;
585}
73b38711
DL
586
587static void __net_exit ip_rt_do_proc_exit(struct net *net)
588{
589 remove_proc_entry("rt_cache", net->proc_net_stat);
590 remove_proc_entry("rt_cache", net->proc_net);
591 remove_proc_entry("rt_acct", net->proc_net);
592}
593
594static struct pernet_operations ip_rt_proc_ops __net_initdata = {
595 .init = ip_rt_do_proc_init,
596 .exit = ip_rt_do_proc_exit,
597};
598
599static int __init ip_rt_proc_init(void)
600{
601 return register_pernet_subsys(&ip_rt_proc_ops);
602}
603
107f1634 604#else
73b38711 605static inline int ip_rt_proc_init(void)
107f1634
PE
606{
607 return 0;
608}
1da177e4 609#endif /* CONFIG_PROC_FS */
e905a9ed 610
5969f71d 611static inline void rt_free(struct rtable *rt)
1da177e4 612{
1da177e4
LT
613 call_rcu_bh(&rt->u.dst.rcu_head, dst_rcu_free);
614}
615
5969f71d 616static inline void rt_drop(struct rtable *rt)
1da177e4 617{
1da177e4
LT
618 ip_rt_put(rt);
619 call_rcu_bh(&rt->u.dst.rcu_head, dst_rcu_free);
620}
621
5969f71d 622static inline int rt_fast_clean(struct rtable *rth)
1da177e4
LT
623{
624 /* Kill broadcast/multicast entries very aggresively, if they
625 collide in hash table with more useful entries */
626 return (rth->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST)) &&
093c2ca4 627 rth->fl.iif && rth->u.dst.rt_next;
1da177e4
LT
628}
629
5969f71d 630static inline int rt_valuable(struct rtable *rth)
1da177e4
LT
631{
632 return (rth->rt_flags & (RTCF_REDIRECTED | RTCF_NOTIFY)) ||
633 rth->u.dst.expires;
634}
635
636static int rt_may_expire(struct rtable *rth, unsigned long tmo1, unsigned long tmo2)
637{
638 unsigned long age;
639 int ret = 0;
640
641 if (atomic_read(&rth->u.dst.__refcnt))
642 goto out;
643
644 ret = 1;
645 if (rth->u.dst.expires &&
646 time_after_eq(jiffies, rth->u.dst.expires))
647 goto out;
648
649 age = jiffies - rth->u.dst.lastuse;
650 ret = 0;
651 if ((age <= tmo1 && !rt_fast_clean(rth)) ||
652 (age <= tmo2 && rt_valuable(rth)))
653 goto out;
654 ret = 1;
655out: return ret;
656}
657
658/* Bits of score are:
659 * 31: very valuable
660 * 30: not quite useless
661 * 29..0: usage counter
662 */
663static inline u32 rt_score(struct rtable *rt)
664{
665 u32 score = jiffies - rt->u.dst.lastuse;
666
667 score = ~score & ~(3<<30);
668
669 if (rt_valuable(rt))
670 score |= (1<<31);
671
672 if (!rt->fl.iif ||
673 !(rt->rt_flags & (RTCF_BROADCAST|RTCF_MULTICAST|RTCF_LOCAL)))
674 score |= (1<<30);
675
676 return score;
677}
678
1080d709
NH
679static inline bool rt_caching(const struct net *net)
680{
681 return net->ipv4.current_rt_cache_rebuild_count <=
682 net->ipv4.sysctl_rt_cache_rebuild_count;
683}
684
685static inline bool compare_hash_inputs(const struct flowi *fl1,
686 const struct flowi *fl2)
687{
688 return (__force u32)(((fl1->nl_u.ip4_u.daddr ^ fl2->nl_u.ip4_u.daddr) |
689 (fl1->nl_u.ip4_u.saddr ^ fl2->nl_u.ip4_u.saddr) |
690 (fl1->iif ^ fl2->iif)) == 0);
691}
692
1da177e4
LT
693static inline int compare_keys(struct flowi *fl1, struct flowi *fl2)
694{
714e85be
AV
695 return ((__force u32)((fl1->nl_u.ip4_u.daddr ^ fl2->nl_u.ip4_u.daddr) |
696 (fl1->nl_u.ip4_u.saddr ^ fl2->nl_u.ip4_u.saddr)) |
47dcf0cb 697 (fl1->mark ^ fl2->mark) |
8238b218
DM
698 (*(u16 *)&fl1->nl_u.ip4_u.tos ^
699 *(u16 *)&fl2->nl_u.ip4_u.tos) |
700 (fl1->oif ^ fl2->oif) |
701 (fl1->iif ^ fl2->iif)) == 0;
1da177e4
LT
702}
703
b5921910
DL
704static inline int compare_netns(struct rtable *rt1, struct rtable *rt2)
705{
c346dca1 706 return dev_net(rt1->u.dst.dev) == dev_net(rt2->u.dst.dev);
b5921910
DL
707}
708
e84f84f2
DL
709static inline int rt_is_expired(struct rtable *rth)
710{
711 return rth->rt_genid != rt_genid(dev_net(rth->u.dst.dev));
712}
713
beb659bd
ED
714/*
715 * Perform a full scan of hash table and free all entries.
716 * Can be called by a softirq or a process.
717 * In the later case, we want to be reschedule if necessary
718 */
719static void rt_do_flush(int process_context)
720{
721 unsigned int i;
722 struct rtable *rth, *next;
32cb5b4e 723 struct rtable * tail;
beb659bd
ED
724
725 for (i = 0; i <= rt_hash_mask; i++) {
726 if (process_context && need_resched())
727 cond_resched();
728 rth = rt_hash_table[i].chain;
729 if (!rth)
730 continue;
731
732 spin_lock_bh(rt_hash_lock_addr(i));
32cb5b4e
DL
733#ifdef CONFIG_NET_NS
734 {
735 struct rtable ** prev, * p;
736
737 rth = rt_hash_table[i].chain;
738
739 /* defer releasing the head of the list after spin_unlock */
740 for (tail = rth; tail; tail = tail->u.dst.rt_next)
741 if (!rt_is_expired(tail))
742 break;
743 if (rth != tail)
744 rt_hash_table[i].chain = tail;
745
746 /* call rt_free on entries after the tail requiring flush */
747 prev = &rt_hash_table[i].chain;
748 for (p = *prev; p; p = next) {
749 next = p->u.dst.rt_next;
750 if (!rt_is_expired(p)) {
751 prev = &p->u.dst.rt_next;
752 } else {
753 *prev = next;
754 rt_free(p);
755 }
756 }
757 }
758#else
beb659bd
ED
759 rth = rt_hash_table[i].chain;
760 rt_hash_table[i].chain = NULL;
32cb5b4e
DL
761 tail = NULL;
762#endif
beb659bd
ED
763 spin_unlock_bh(rt_hash_lock_addr(i));
764
32cb5b4e 765 for (; rth != tail; rth = next) {
beb659bd
ED
766 next = rth->u.dst.rt_next;
767 rt_free(rth);
768 }
769 }
770}
771
1080d709
NH
772/*
773 * While freeing expired entries, we compute average chain length
774 * and standard deviation, using fixed-point arithmetic.
775 * This to have an estimation of rt_chain_length_max
776 * rt_chain_length_max = max(elasticity, AVG + 4*SD)
777 * We use 3 bits for frational part, and 29 (or 61) for magnitude.
778 */
779
780#define FRACT_BITS 3
781#define ONE (1UL << FRACT_BITS)
782
beb659bd 783static void rt_check_expire(void)
1da177e4 784{
bb1d23b0
ED
785 static unsigned int rover;
786 unsigned int i = rover, goal;
1ddbcb00 787 struct rtable *rth, *aux, **rthp;
cf8da764 788 unsigned long samples = 0;
1080d709 789 unsigned long sum = 0, sum2 = 0;
bb1d23b0
ED
790 u64 mult;
791
792 mult = ((u64)ip_rt_gc_interval) << rt_hash_log;
793 if (ip_rt_gc_timeout > 1)
794 do_div(mult, ip_rt_gc_timeout);
795 goal = (unsigned int)mult;
39c90ece
ED
796 if (goal > rt_hash_mask)
797 goal = rt_hash_mask + 1;
bb1d23b0 798 for (; goal > 0; goal--) {
1da177e4 799 unsigned long tmo = ip_rt_gc_timeout;
cf8da764 800 unsigned long length;
1da177e4
LT
801
802 i = (i + 1) & rt_hash_mask;
803 rthp = &rt_hash_table[i].chain;
804
d90bf5a9
ED
805 if (need_resched())
806 cond_resched();
807
1080d709
NH
808 samples++;
809
cfcabdcc 810 if (*rthp == NULL)
bb1d23b0 811 continue;
cf8da764 812 length = 0;
39c90ece 813 spin_lock_bh(rt_hash_lock_addr(i));
1da177e4 814 while ((rth = *rthp) != NULL) {
1ddbcb00 815 prefetch(rth->u.dst.rt_next);
e84f84f2 816 if (rt_is_expired(rth)) {
29e75252
ED
817 *rthp = rth->u.dst.rt_next;
818 rt_free(rth);
819 continue;
820 }
1da177e4
LT
821 if (rth->u.dst.expires) {
822 /* Entry is expired even if it is in use */
39c90ece 823 if (time_before_eq(jiffies, rth->u.dst.expires)) {
1ddbcb00 824nofree:
1da177e4 825 tmo >>= 1;
093c2ca4 826 rthp = &rth->u.dst.rt_next;
1080d709 827 /*
1ddbcb00 828 * We only count entries on
1080d709
NH
829 * a chain with equal hash inputs once
830 * so that entries for different QOS
831 * levels, and other non-hash input
832 * attributes don't unfairly skew
833 * the length computation
834 */
1ddbcb00
ED
835 for (aux = rt_hash_table[i].chain;;) {
836 if (aux == rth) {
837 length += ONE;
838 break;
839 }
840 if (compare_hash_inputs(&aux->fl, &rth->fl))
841 break;
842 aux = aux->u.dst.rt_next;
843 }
1da177e4
LT
844 continue;
845 }
1ddbcb00
ED
846 } else if (!rt_may_expire(rth, tmo, ip_rt_gc_timeout))
847 goto nofree;
1da177e4
LT
848
849 /* Cleanup aged off entries. */
093c2ca4 850 *rthp = rth->u.dst.rt_next;
e905a9ed 851 rt_free(rth);
1da177e4 852 }
39c90ece 853 spin_unlock_bh(rt_hash_lock_addr(i));
1080d709
NH
854 sum += length;
855 sum2 += length*length;
856 }
857 if (samples) {
858 unsigned long avg = sum / samples;
859 unsigned long sd = int_sqrt(sum2 / samples - avg*avg);
860 rt_chain_length_max = max_t(unsigned long,
861 ip_rt_gc_elasticity,
862 (avg + 4*sd) >> FRACT_BITS);
1da177e4
LT
863 }
864 rover = i;
beb659bd
ED
865}
866
867/*
868 * rt_worker_func() is run in process context.
29e75252 869 * we call rt_check_expire() to scan part of the hash table
beb659bd
ED
870 */
871static void rt_worker_func(struct work_struct *work)
872{
29e75252 873 rt_check_expire();
39c90ece 874 schedule_delayed_work(&expires_work, ip_rt_gc_interval);
1da177e4
LT
875}
876
29e75252
ED
877/*
878 * Pertubation of rt_genid by a small quantity [1..256]
879 * Using 8 bits of shuffling ensure we can call rt_cache_invalidate()
880 * many times (2^24) without giving recent rt_genid.
881 * Jenkins hash is strong enough that litle changes of rt_genid are OK.
1da177e4 882 */
86c657f6 883static void rt_cache_invalidate(struct net *net)
1da177e4 884{
29e75252 885 unsigned char shuffle;
1da177e4 886
29e75252 887 get_random_bytes(&shuffle, sizeof(shuffle));
e84f84f2 888 atomic_add(shuffle + 1U, &net->ipv4.rt_genid);
1da177e4
LT
889}
890
29e75252
ED
891/*
892 * delay < 0 : invalidate cache (fast : entries will be deleted later)
893 * delay >= 0 : invalidate & flush cache (can be long)
894 */
76e6ebfb 895void rt_cache_flush(struct net *net, int delay)
1da177e4 896{
86c657f6 897 rt_cache_invalidate(net);
29e75252
ED
898 if (delay >= 0)
899 rt_do_flush(!in_softirq());
1da177e4
LT
900}
901
beb659bd 902/*
29e75252 903 * We change rt_genid and let gc do the cleanup
beb659bd 904 */
9f5e97e5 905static void rt_secret_rebuild(unsigned long __net)
1da177e4 906{
9f5e97e5 907 struct net *net = (struct net *)__net;
86c657f6 908 rt_cache_invalidate(net);
9f5e97e5 909 mod_timer(&net->ipv4.rt_secret_timer, jiffies + ip_rt_secret_interval);
1da177e4
LT
910}
911
1080d709
NH
912static void rt_secret_rebuild_oneshot(struct net *net)
913{
914 del_timer_sync(&net->ipv4.rt_secret_timer);
915 rt_cache_invalidate(net);
916 if (ip_rt_secret_interval) {
917 net->ipv4.rt_secret_timer.expires += ip_rt_secret_interval;
918 add_timer(&net->ipv4.rt_secret_timer);
919 }
920}
921
922static void rt_emergency_hash_rebuild(struct net *net)
923{
924 if (net_ratelimit()) {
925 printk(KERN_WARNING "Route hash chain too long!\n");
926 printk(KERN_WARNING "Adjust your secret_interval!\n");
927 }
928
929 rt_secret_rebuild_oneshot(net);
930}
931
1da177e4
LT
932/*
933 Short description of GC goals.
934
935 We want to build algorithm, which will keep routing cache
936 at some equilibrium point, when number of aged off entries
937 is kept approximately equal to newly generated ones.
938
939 Current expiration strength is variable "expire".
940 We try to adjust it dynamically, so that if networking
941 is idle expires is large enough to keep enough of warm entries,
942 and when load increases it reduces to limit cache size.
943 */
944
569d3645 945static int rt_garbage_collect(struct dst_ops *ops)
1da177e4
LT
946{
947 static unsigned long expire = RT_GC_TIMEOUT;
948 static unsigned long last_gc;
949 static int rover;
950 static int equilibrium;
951 struct rtable *rth, **rthp;
952 unsigned long now = jiffies;
953 int goal;
954
955 /*
956 * Garbage collection is pretty expensive,
957 * do not make it too frequently.
958 */
959
960 RT_CACHE_STAT_INC(gc_total);
961
962 if (now - last_gc < ip_rt_gc_min_interval &&
963 atomic_read(&ipv4_dst_ops.entries) < ip_rt_max_size) {
964 RT_CACHE_STAT_INC(gc_ignored);
965 goto out;
966 }
967
968 /* Calculate number of entries, which we want to expire now. */
969 goal = atomic_read(&ipv4_dst_ops.entries) -
970 (ip_rt_gc_elasticity << rt_hash_log);
971 if (goal <= 0) {
972 if (equilibrium < ipv4_dst_ops.gc_thresh)
973 equilibrium = ipv4_dst_ops.gc_thresh;
974 goal = atomic_read(&ipv4_dst_ops.entries) - equilibrium;
975 if (goal > 0) {
b790cedd 976 equilibrium += min_t(unsigned int, goal >> 1, rt_hash_mask + 1);
1da177e4
LT
977 goal = atomic_read(&ipv4_dst_ops.entries) - equilibrium;
978 }
979 } else {
980 /* We are in dangerous area. Try to reduce cache really
981 * aggressively.
982 */
b790cedd 983 goal = max_t(unsigned int, goal >> 1, rt_hash_mask + 1);
1da177e4
LT
984 equilibrium = atomic_read(&ipv4_dst_ops.entries) - goal;
985 }
986
987 if (now - last_gc >= ip_rt_gc_min_interval)
988 last_gc = now;
989
990 if (goal <= 0) {
991 equilibrium += goal;
992 goto work_done;
993 }
994
995 do {
996 int i, k;
997
998 for (i = rt_hash_mask, k = rover; i >= 0; i--) {
999 unsigned long tmo = expire;
1000
1001 k = (k + 1) & rt_hash_mask;
1002 rthp = &rt_hash_table[k].chain;
22c047cc 1003 spin_lock_bh(rt_hash_lock_addr(k));
1da177e4 1004 while ((rth = *rthp) != NULL) {
e84f84f2 1005 if (!rt_is_expired(rth) &&
29e75252 1006 !rt_may_expire(rth, tmo, expire)) {
1da177e4 1007 tmo >>= 1;
093c2ca4 1008 rthp = &rth->u.dst.rt_next;
1da177e4
LT
1009 continue;
1010 }
093c2ca4 1011 *rthp = rth->u.dst.rt_next;
1da177e4
LT
1012 rt_free(rth);
1013 goal--;
1da177e4 1014 }
22c047cc 1015 spin_unlock_bh(rt_hash_lock_addr(k));
1da177e4
LT
1016 if (goal <= 0)
1017 break;
1018 }
1019 rover = k;
1020
1021 if (goal <= 0)
1022 goto work_done;
1023
1024 /* Goal is not achieved. We stop process if:
1025
1026 - if expire reduced to zero. Otherwise, expire is halfed.
1027 - if table is not full.
1028 - if we are called from interrupt.
1029 - jiffies check is just fallback/debug loop breaker.
1030 We will not spin here for long time in any case.
1031 */
1032
1033 RT_CACHE_STAT_INC(gc_goal_miss);
1034
1035 if (expire == 0)
1036 break;
1037
1038 expire >>= 1;
1039#if RT_CACHE_DEBUG >= 2
1040 printk(KERN_DEBUG "expire>> %u %d %d %d\n", expire,
1041 atomic_read(&ipv4_dst_ops.entries), goal, i);
1042#endif
1043
1044 if (atomic_read(&ipv4_dst_ops.entries) < ip_rt_max_size)
1045 goto out;
1046 } while (!in_softirq() && time_before_eq(jiffies, now));
1047
1048 if (atomic_read(&ipv4_dst_ops.entries) < ip_rt_max_size)
1049 goto out;
1050 if (net_ratelimit())
1051 printk(KERN_WARNING "dst cache overflow\n");
1052 RT_CACHE_STAT_INC(gc_dst_overflow);
1053 return 1;
1054
1055work_done:
1056 expire += ip_rt_gc_min_interval;
1057 if (expire > ip_rt_gc_timeout ||
1058 atomic_read(&ipv4_dst_ops.entries) < ipv4_dst_ops.gc_thresh)
1059 expire = ip_rt_gc_timeout;
1060#if RT_CACHE_DEBUG >= 2
1061 printk(KERN_DEBUG "expire++ %u %d %d %d\n", expire,
1062 atomic_read(&ipv4_dst_ops.entries), goal, rover);
1063#endif
1064out: return 0;
1065}
1066
511c3f92
ED
1067static int rt_intern_hash(unsigned hash, struct rtable *rt,
1068 struct rtable **rp, struct sk_buff *skb)
1da177e4
LT
1069{
1070 struct rtable *rth, **rthp;
1071 unsigned long now;
1072 struct rtable *cand, **candp;
1073 u32 min_score;
1074 int chain_length;
1075 int attempts = !in_softirq();
1076
1077restart:
1078 chain_length = 0;
1079 min_score = ~(u32)0;
1080 cand = NULL;
1081 candp = NULL;
1082 now = jiffies;
1083
1080d709
NH
1084 if (!rt_caching(dev_net(rt->u.dst.dev))) {
1085 rt_drop(rt);
1086 return 0;
1087 }
1088
1da177e4
LT
1089 rthp = &rt_hash_table[hash].chain;
1090
22c047cc 1091 spin_lock_bh(rt_hash_lock_addr(hash));
1da177e4 1092 while ((rth = *rthp) != NULL) {
e84f84f2 1093 if (rt_is_expired(rth)) {
29e75252
ED
1094 *rthp = rth->u.dst.rt_next;
1095 rt_free(rth);
1096 continue;
1097 }
b5921910 1098 if (compare_keys(&rth->fl, &rt->fl) && compare_netns(rth, rt)) {
1da177e4 1099 /* Put it first */
093c2ca4 1100 *rthp = rth->u.dst.rt_next;
1da177e4
LT
1101 /*
1102 * Since lookup is lockfree, the deletion
1103 * must be visible to another weakly ordered CPU before
1104 * the insertion at the start of the hash chain.
1105 */
093c2ca4 1106 rcu_assign_pointer(rth->u.dst.rt_next,
1da177e4
LT
1107 rt_hash_table[hash].chain);
1108 /*
1109 * Since lookup is lockfree, the update writes
1110 * must be ordered for consistency on SMP.
1111 */
1112 rcu_assign_pointer(rt_hash_table[hash].chain, rth);
1113
03f49f34 1114 dst_use(&rth->u.dst, now);
22c047cc 1115 spin_unlock_bh(rt_hash_lock_addr(hash));
1da177e4
LT
1116
1117 rt_drop(rt);
511c3f92
ED
1118 if (rp)
1119 *rp = rth;
1120 else
1121 skb->dst = &rth->u.dst;
1da177e4
LT
1122 return 0;
1123 }
1124
1125 if (!atomic_read(&rth->u.dst.__refcnt)) {
1126 u32 score = rt_score(rth);
1127
1128 if (score <= min_score) {
1129 cand = rth;
1130 candp = rthp;
1131 min_score = score;
1132 }
1133 }
1134
1135 chain_length++;
1136
093c2ca4 1137 rthp = &rth->u.dst.rt_next;
1da177e4
LT
1138 }
1139
1140 if (cand) {
1141 /* ip_rt_gc_elasticity used to be average length of chain
1142 * length, when exceeded gc becomes really aggressive.
1143 *
1144 * The second limit is less certain. At the moment it allows
1145 * only 2 entries per bucket. We will see.
1146 */
1147 if (chain_length > ip_rt_gc_elasticity) {
093c2ca4 1148 *candp = cand->u.dst.rt_next;
1da177e4
LT
1149 rt_free(cand);
1150 }
1080d709
NH
1151 } else {
1152 if (chain_length > rt_chain_length_max) {
1153 struct net *net = dev_net(rt->u.dst.dev);
1154 int num = ++net->ipv4.current_rt_cache_rebuild_count;
1155 if (!rt_caching(dev_net(rt->u.dst.dev))) {
1156 printk(KERN_WARNING "%s: %d rebuilds is over limit, route caching disabled\n",
1157 rt->u.dst.dev->name, num);
1158 }
1159 rt_emergency_hash_rebuild(dev_net(rt->u.dst.dev));
1160 }
1da177e4
LT
1161 }
1162
1163 /* Try to bind route to arp only if it is output
1164 route or unicast forwarding path.
1165 */
1166 if (rt->rt_type == RTN_UNICAST || rt->fl.iif == 0) {
1167 int err = arp_bind_neighbour(&rt->u.dst);
1168 if (err) {
22c047cc 1169 spin_unlock_bh(rt_hash_lock_addr(hash));
1da177e4
LT
1170
1171 if (err != -ENOBUFS) {
1172 rt_drop(rt);
1173 return err;
1174 }
1175
1176 /* Neighbour tables are full and nothing
1177 can be released. Try to shrink route cache,
1178 it is most likely it holds some neighbour records.
1179 */
1180 if (attempts-- > 0) {
1181 int saved_elasticity = ip_rt_gc_elasticity;
1182 int saved_int = ip_rt_gc_min_interval;
1183 ip_rt_gc_elasticity = 1;
1184 ip_rt_gc_min_interval = 0;
569d3645 1185 rt_garbage_collect(&ipv4_dst_ops);
1da177e4
LT
1186 ip_rt_gc_min_interval = saved_int;
1187 ip_rt_gc_elasticity = saved_elasticity;
1188 goto restart;
1189 }
1190
1191 if (net_ratelimit())
1192 printk(KERN_WARNING "Neighbour table overflow.\n");
1193 rt_drop(rt);
1194 return -ENOBUFS;
1195 }
1196 }
1197
1ddbcb00 1198 rt->u.dst.rt_next = rt_hash_table[hash].chain;
1080d709 1199
1da177e4 1200#if RT_CACHE_DEBUG >= 2
093c2ca4 1201 if (rt->u.dst.rt_next) {
1da177e4 1202 struct rtable *trt;
673d57e7 1203 printk(KERN_DEBUG "rt_cache @%02x: %pI4", hash, &rt->rt_dst);
093c2ca4 1204 for (trt = rt->u.dst.rt_next; trt; trt = trt->u.dst.rt_next)
673d57e7 1205 printk(" . %pI4", &trt->rt_dst);
1da177e4
LT
1206 printk("\n");
1207 }
1208#endif
00269b54
ED
1209 /*
1210 * Since lookup is lockfree, we must make sure
1211 * previous writes to rt are comitted to memory
1212 * before making rt visible to other CPUS.
1213 */
1ddbcb00 1214 rcu_assign_pointer(rt_hash_table[hash].chain, rt);
1080d709 1215
22c047cc 1216 spin_unlock_bh(rt_hash_lock_addr(hash));
511c3f92
ED
1217 if (rp)
1218 *rp = rt;
1219 else
1220 skb->dst = &rt->u.dst;
1da177e4
LT
1221 return 0;
1222}
1223
1224void rt_bind_peer(struct rtable *rt, int create)
1225{
1226 static DEFINE_SPINLOCK(rt_peer_lock);
1227 struct inet_peer *peer;
1228
1229 peer = inet_getpeer(rt->rt_dst, create);
1230
1231 spin_lock_bh(&rt_peer_lock);
1232 if (rt->peer == NULL) {
1233 rt->peer = peer;
1234 peer = NULL;
1235 }
1236 spin_unlock_bh(&rt_peer_lock);
1237 if (peer)
1238 inet_putpeer(peer);
1239}
1240
1241/*
1242 * Peer allocation may fail only in serious out-of-memory conditions. However
1243 * we still can generate some output.
1244 * Random ID selection looks a bit dangerous because we have no chances to
1245 * select ID being unique in a reasonable period of time.
1246 * But broken packet identifier may be better than no packet at all.
1247 */
1248static void ip_select_fb_ident(struct iphdr *iph)
1249{
1250 static DEFINE_SPINLOCK(ip_fb_id_lock);
1251 static u32 ip_fallback_id;
1252 u32 salt;
1253
1254 spin_lock_bh(&ip_fb_id_lock);
e448515c 1255 salt = secure_ip_id((__force __be32)ip_fallback_id ^ iph->daddr);
1da177e4
LT
1256 iph->id = htons(salt & 0xFFFF);
1257 ip_fallback_id = salt;
1258 spin_unlock_bh(&ip_fb_id_lock);
1259}
1260
1261void __ip_select_ident(struct iphdr *iph, struct dst_entry *dst, int more)
1262{
1263 struct rtable *rt = (struct rtable *) dst;
1264
1265 if (rt) {
1266 if (rt->peer == NULL)
1267 rt_bind_peer(rt, 1);
1268
1269 /* If peer is attached to destination, it is never detached,
1270 so that we need not to grab a lock to dereference it.
1271 */
1272 if (rt->peer) {
1273 iph->id = htons(inet_getid(rt->peer, more));
1274 return;
1275 }
1276 } else
e905a9ed 1277 printk(KERN_DEBUG "rt_bind_peer(0) @%p\n",
9c2b3328 1278 __builtin_return_address(0));
1da177e4
LT
1279
1280 ip_select_fb_ident(iph);
1281}
1282
1283static void rt_del(unsigned hash, struct rtable *rt)
1284{
29e75252 1285 struct rtable **rthp, *aux;
1da177e4 1286
29e75252 1287 rthp = &rt_hash_table[hash].chain;
22c047cc 1288 spin_lock_bh(rt_hash_lock_addr(hash));
1da177e4 1289 ip_rt_put(rt);
29e75252 1290 while ((aux = *rthp) != NULL) {
e84f84f2 1291 if (aux == rt || rt_is_expired(aux)) {
29e75252
ED
1292 *rthp = aux->u.dst.rt_next;
1293 rt_free(aux);
1294 continue;
1da177e4 1295 }
29e75252
ED
1296 rthp = &aux->u.dst.rt_next;
1297 }
22c047cc 1298 spin_unlock_bh(rt_hash_lock_addr(hash));
1da177e4
LT
1299}
1300
f7655229
AV
1301void ip_rt_redirect(__be32 old_gw, __be32 daddr, __be32 new_gw,
1302 __be32 saddr, struct net_device *dev)
1da177e4
LT
1303{
1304 int i, k;
1305 struct in_device *in_dev = in_dev_get(dev);
1306 struct rtable *rth, **rthp;
f7655229 1307 __be32 skeys[2] = { saddr, 0 };
1da177e4 1308 int ikeys[2] = { dev->ifindex, 0 };
8d71740c 1309 struct netevent_redirect netevent;
317805b8 1310 struct net *net;
1da177e4 1311
1da177e4
LT
1312 if (!in_dev)
1313 return;
1314
c346dca1 1315 net = dev_net(dev);
1da177e4 1316 if (new_gw == old_gw || !IN_DEV_RX_REDIRECTS(in_dev)
1e637c74 1317 || ipv4_is_multicast(new_gw) || ipv4_is_lbcast(new_gw)
f97c1e0c 1318 || ipv4_is_zeronet(new_gw))
1da177e4
LT
1319 goto reject_redirect;
1320
1080d709
NH
1321 if (!rt_caching(net))
1322 goto reject_redirect;
1323
1da177e4
LT
1324 if (!IN_DEV_SHARED_MEDIA(in_dev)) {
1325 if (!inet_addr_onlink(in_dev, new_gw, old_gw))
1326 goto reject_redirect;
1327 if (IN_DEV_SEC_REDIRECTS(in_dev) && ip_fib_check_default(new_gw, dev))
1328 goto reject_redirect;
1329 } else {
317805b8 1330 if (inet_addr_type(net, new_gw) != RTN_UNICAST)
1da177e4
LT
1331 goto reject_redirect;
1332 }
1333
1334 for (i = 0; i < 2; i++) {
1335 for (k = 0; k < 2; k++) {
b00180de 1336 unsigned hash = rt_hash(daddr, skeys[i], ikeys[k],
e84f84f2 1337 rt_genid(net));
1da177e4
LT
1338
1339 rthp=&rt_hash_table[hash].chain;
1340
1341 rcu_read_lock();
1342 while ((rth = rcu_dereference(*rthp)) != NULL) {
1343 struct rtable *rt;
1344
1345 if (rth->fl.fl4_dst != daddr ||
1346 rth->fl.fl4_src != skeys[i] ||
1da177e4 1347 rth->fl.oif != ikeys[k] ||
29e75252 1348 rth->fl.iif != 0 ||
e84f84f2 1349 rt_is_expired(rth) ||
878628fb 1350 !net_eq(dev_net(rth->u.dst.dev), net)) {
093c2ca4 1351 rthp = &rth->u.dst.rt_next;
1da177e4
LT
1352 continue;
1353 }
1354
1355 if (rth->rt_dst != daddr ||
1356 rth->rt_src != saddr ||
1357 rth->u.dst.error ||
1358 rth->rt_gateway != old_gw ||
1359 rth->u.dst.dev != dev)
1360 break;
1361
1362 dst_hold(&rth->u.dst);
1363 rcu_read_unlock();
1364
1365 rt = dst_alloc(&ipv4_dst_ops);
1366 if (rt == NULL) {
1367 ip_rt_put(rth);
1368 in_dev_put(in_dev);
1369 return;
1370 }
1371
1372 /* Copy all the information. */
1373 *rt = *rth;
1da177e4
LT
1374 rt->u.dst.__use = 1;
1375 atomic_set(&rt->u.dst.__refcnt, 1);
1376 rt->u.dst.child = NULL;
1377 if (rt->u.dst.dev)
1378 dev_hold(rt->u.dst.dev);
1379 if (rt->idev)
1380 in_dev_hold(rt->idev);
1381 rt->u.dst.obsolete = 0;
1382 rt->u.dst.lastuse = jiffies;
1383 rt->u.dst.path = &rt->u.dst;
1384 rt->u.dst.neighbour = NULL;
1385 rt->u.dst.hh = NULL;
def8b4fa 1386#ifdef CONFIG_XFRM
1da177e4 1387 rt->u.dst.xfrm = NULL;
def8b4fa 1388#endif
e84f84f2 1389 rt->rt_genid = rt_genid(net);
1da177e4
LT
1390 rt->rt_flags |= RTCF_REDIRECTED;
1391
1392 /* Gateway is different ... */
1393 rt->rt_gateway = new_gw;
1394
1395 /* Redirect received -> path was valid */
1396 dst_confirm(&rth->u.dst);
1397
1398 if (rt->peer)
1399 atomic_inc(&rt->peer->refcnt);
1400
1401 if (arp_bind_neighbour(&rt->u.dst) ||
1402 !(rt->u.dst.neighbour->nud_state &
1403 NUD_VALID)) {
1404 if (rt->u.dst.neighbour)
1405 neigh_event_send(rt->u.dst.neighbour, NULL);
1406 ip_rt_put(rth);
1407 rt_drop(rt);
1408 goto do_next;
1409 }
e905a9ed 1410
8d71740c
TT
1411 netevent.old = &rth->u.dst;
1412 netevent.new = &rt->u.dst;
e905a9ed
YH
1413 call_netevent_notifiers(NETEVENT_REDIRECT,
1414 &netevent);
1da177e4
LT
1415
1416 rt_del(hash, rth);
511c3f92 1417 if (!rt_intern_hash(hash, rt, &rt, NULL))
1da177e4
LT
1418 ip_rt_put(rt);
1419 goto do_next;
1420 }
1421 rcu_read_unlock();
1422 do_next:
1423 ;
1424 }
1425 }
1426 in_dev_put(in_dev);
1427 return;
1428
1429reject_redirect:
1430#ifdef CONFIG_IP_ROUTE_VERBOSE
1431 if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit())
673d57e7
HH
1432 printk(KERN_INFO "Redirect from %pI4 on %s about %pI4 ignored.\n"
1433 " Advised path = %pI4 -> %pI4\n",
1434 &old_gw, dev->name, &new_gw,
1435 &saddr, &daddr);
1da177e4
LT
1436#endif
1437 in_dev_put(in_dev);
1438}
1439
1440static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst)
1441{
ee6b9673 1442 struct rtable *rt = (struct rtable *)dst;
1da177e4
LT
1443 struct dst_entry *ret = dst;
1444
1445 if (rt) {
1446 if (dst->obsolete) {
1447 ip_rt_put(rt);
1448 ret = NULL;
1449 } else if ((rt->rt_flags & RTCF_REDIRECTED) ||
1450 rt->u.dst.expires) {
8c7bc840 1451 unsigned hash = rt_hash(rt->fl.fl4_dst, rt->fl.fl4_src,
b00180de 1452 rt->fl.oif,
e84f84f2 1453 rt_genid(dev_net(dst->dev)));
1da177e4 1454#if RT_CACHE_DEBUG >= 1
673d57e7
HH
1455 printk(KERN_DEBUG "ipv4_negative_advice: redirect to %pI4/%02x dropped\n",
1456 &rt->rt_dst, rt->fl.fl4_tos);
1da177e4
LT
1457#endif
1458 rt_del(hash, rt);
1459 ret = NULL;
1460 }
1461 }
1462 return ret;
1463}
1464
1465/*
1466 * Algorithm:
1467 * 1. The first ip_rt_redirect_number redirects are sent
1468 * with exponential backoff, then we stop sending them at all,
1469 * assuming that the host ignores our redirects.
1470 * 2. If we did not see packets requiring redirects
1471 * during ip_rt_redirect_silence, we assume that the host
1472 * forgot redirected route and start to send redirects again.
1473 *
1474 * This algorithm is much cheaper and more intelligent than dumb load limiting
1475 * in icmp.c.
1476 *
1477 * NOTE. Do not forget to inhibit load limiting for redirects (redundant)
1478 * and "frag. need" (breaks PMTU discovery) in icmp.c.
1479 */
1480
1481void ip_rt_send_redirect(struct sk_buff *skb)
1482{
511c3f92 1483 struct rtable *rt = skb_rtable(skb);
1da177e4
LT
1484 struct in_device *in_dev = in_dev_get(rt->u.dst.dev);
1485
1486 if (!in_dev)
1487 return;
1488
1489 if (!IN_DEV_TX_REDIRECTS(in_dev))
1490 goto out;
1491
1492 /* No redirected packets during ip_rt_redirect_silence;
1493 * reset the algorithm.
1494 */
1495 if (time_after(jiffies, rt->u.dst.rate_last + ip_rt_redirect_silence))
1496 rt->u.dst.rate_tokens = 0;
1497
1498 /* Too many ignored redirects; do not send anything
1499 * set u.dst.rate_last to the last seen redirected packet.
1500 */
1501 if (rt->u.dst.rate_tokens >= ip_rt_redirect_number) {
1502 rt->u.dst.rate_last = jiffies;
1503 goto out;
1504 }
1505
1506 /* Check for load limit; set rate_last to the latest sent
1507 * redirect.
1508 */
14fb8a76
LY
1509 if (rt->u.dst.rate_tokens == 0 ||
1510 time_after(jiffies,
1da177e4
LT
1511 (rt->u.dst.rate_last +
1512 (ip_rt_redirect_load << rt->u.dst.rate_tokens)))) {
1513 icmp_send(skb, ICMP_REDIRECT, ICMP_REDIR_HOST, rt->rt_gateway);
1514 rt->u.dst.rate_last = jiffies;
1515 ++rt->u.dst.rate_tokens;
1516#ifdef CONFIG_IP_ROUTE_VERBOSE
1517 if (IN_DEV_LOG_MARTIANS(in_dev) &&
1518 rt->u.dst.rate_tokens == ip_rt_redirect_number &&
1519 net_ratelimit())
673d57e7
HH
1520 printk(KERN_WARNING "host %pI4/if%d ignores redirects for %pI4 to %pI4.\n",
1521 &rt->rt_src, rt->rt_iif,
1522 &rt->rt_dst, &rt->rt_gateway);
1da177e4
LT
1523#endif
1524 }
1525out:
e905a9ed 1526 in_dev_put(in_dev);
1da177e4
LT
1527}
1528
1529static int ip_error(struct sk_buff *skb)
1530{
511c3f92 1531 struct rtable *rt = skb_rtable(skb);
1da177e4
LT
1532 unsigned long now;
1533 int code;
1534
1535 switch (rt->u.dst.error) {
1536 case EINVAL:
1537 default:
1538 goto out;
1539 case EHOSTUNREACH:
1540 code = ICMP_HOST_UNREACH;
1541 break;
1542 case ENETUNREACH:
1543 code = ICMP_NET_UNREACH;
7c73a6fa
PE
1544 IP_INC_STATS_BH(dev_net(rt->u.dst.dev),
1545 IPSTATS_MIB_INNOROUTES);
1da177e4
LT
1546 break;
1547 case EACCES:
1548 code = ICMP_PKT_FILTERED;
1549 break;
1550 }
1551
1552 now = jiffies;
1553 rt->u.dst.rate_tokens += now - rt->u.dst.rate_last;
1554 if (rt->u.dst.rate_tokens > ip_rt_error_burst)
1555 rt->u.dst.rate_tokens = ip_rt_error_burst;
1556 rt->u.dst.rate_last = now;
1557 if (rt->u.dst.rate_tokens >= ip_rt_error_cost) {
1558 rt->u.dst.rate_tokens -= ip_rt_error_cost;
1559 icmp_send(skb, ICMP_DEST_UNREACH, code, 0);
1560 }
1561
1562out: kfree_skb(skb);
1563 return 0;
e905a9ed 1564}
1da177e4
LT
1565
1566/*
1567 * The last two values are not from the RFC but
1568 * are needed for AMPRnet AX.25 paths.
1569 */
1570
9b5b5cff 1571static const unsigned short mtu_plateau[] =
1da177e4
LT
1572{32000, 17914, 8166, 4352, 2002, 1492, 576, 296, 216, 128 };
1573
5969f71d 1574static inline unsigned short guess_mtu(unsigned short old_mtu)
1da177e4
LT
1575{
1576 int i;
e905a9ed 1577
1da177e4
LT
1578 for (i = 0; i < ARRAY_SIZE(mtu_plateau); i++)
1579 if (old_mtu > mtu_plateau[i])
1580 return mtu_plateau[i];
1581 return 68;
1582}
1583
b5921910 1584unsigned short ip_rt_frag_needed(struct net *net, struct iphdr *iph,
0010e465
TT
1585 unsigned short new_mtu,
1586 struct net_device *dev)
1da177e4 1587{
0010e465 1588 int i, k;
1da177e4
LT
1589 unsigned short old_mtu = ntohs(iph->tot_len);
1590 struct rtable *rth;
0010e465 1591 int ikeys[2] = { dev->ifindex, 0 };
e448515c
AV
1592 __be32 skeys[2] = { iph->saddr, 0, };
1593 __be32 daddr = iph->daddr;
1da177e4
LT
1594 unsigned short est_mtu = 0;
1595
1596 if (ipv4_config.no_pmtu_disc)
1597 return 0;
1598
0010e465
TT
1599 for (k = 0; k < 2; k++) {
1600 for (i = 0; i < 2; i++) {
b00180de 1601 unsigned hash = rt_hash(daddr, skeys[i], ikeys[k],
e84f84f2 1602 rt_genid(net));
0010e465
TT
1603
1604 rcu_read_lock();
1605 for (rth = rcu_dereference(rt_hash_table[hash].chain); rth;
1606 rth = rcu_dereference(rth->u.dst.rt_next)) {
1da177e4
LT
1607 unsigned short mtu = new_mtu;
1608
0010e465
TT
1609 if (rth->fl.fl4_dst != daddr ||
1610 rth->fl.fl4_src != skeys[i] ||
1611 rth->rt_dst != daddr ||
1612 rth->rt_src != iph->saddr ||
1613 rth->fl.oif != ikeys[k] ||
1614 rth->fl.iif != 0 ||
1615 dst_metric_locked(&rth->u.dst, RTAX_MTU) ||
1616 !net_eq(dev_net(rth->u.dst.dev), net) ||
6c3b8fc6 1617 rt_is_expired(rth))
0010e465
TT
1618 continue;
1619
1da177e4
LT
1620 if (new_mtu < 68 || new_mtu >= old_mtu) {
1621
1622 /* BSD 4.2 compatibility hack :-( */
1623 if (mtu == 0 &&
6d273f8d 1624 old_mtu >= dst_mtu(&rth->u.dst) &&
1da177e4
LT
1625 old_mtu >= 68 + (iph->ihl << 2))
1626 old_mtu -= iph->ihl << 2;
1627
1628 mtu = guess_mtu(old_mtu);
1629 }
6d273f8d
RR
1630 if (mtu <= dst_mtu(&rth->u.dst)) {
1631 if (mtu < dst_mtu(&rth->u.dst)) {
1da177e4
LT
1632 dst_confirm(&rth->u.dst);
1633 if (mtu < ip_rt_min_pmtu) {
1634 mtu = ip_rt_min_pmtu;
1635 rth->u.dst.metrics[RTAX_LOCK-1] |=
1636 (1 << RTAX_MTU);
1637 }
1638 rth->u.dst.metrics[RTAX_MTU-1] = mtu;
1639 dst_set_expires(&rth->u.dst,
1640 ip_rt_mtu_expires);
1641 }
1642 est_mtu = mtu;
1643 }
1644 }
0010e465 1645 rcu_read_unlock();
1da177e4 1646 }
1da177e4
LT
1647 }
1648 return est_mtu ? : new_mtu;
1649}
1650
1651static void ip_rt_update_pmtu(struct dst_entry *dst, u32 mtu)
1652{
6d273f8d 1653 if (dst_mtu(dst) > mtu && mtu >= 68 &&
1da177e4
LT
1654 !(dst_metric_locked(dst, RTAX_MTU))) {
1655 if (mtu < ip_rt_min_pmtu) {
1656 mtu = ip_rt_min_pmtu;
1657 dst->metrics[RTAX_LOCK-1] |= (1 << RTAX_MTU);
1658 }
1659 dst->metrics[RTAX_MTU-1] = mtu;
1660 dst_set_expires(dst, ip_rt_mtu_expires);
8d71740c 1661 call_netevent_notifiers(NETEVENT_PMTU_UPDATE, dst);
1da177e4
LT
1662 }
1663}
1664
1665static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie)
1666{
1667 return NULL;
1668}
1669
1670static void ipv4_dst_destroy(struct dst_entry *dst)
1671{
1672 struct rtable *rt = (struct rtable *) dst;
1673 struct inet_peer *peer = rt->peer;
1674 struct in_device *idev = rt->idev;
1675
1676 if (peer) {
1677 rt->peer = NULL;
1678 inet_putpeer(peer);
1679 }
1680
1681 if (idev) {
1682 rt->idev = NULL;
1683 in_dev_put(idev);
1684 }
1685}
1686
1687static void ipv4_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
1688 int how)
1689{
1690 struct rtable *rt = (struct rtable *) dst;
1691 struct in_device *idev = rt->idev;
c346dca1 1692 if (dev != dev_net(dev)->loopback_dev && idev && idev->dev == dev) {
5a3e55d6 1693 struct in_device *loopback_idev =
c346dca1 1694 in_dev_get(dev_net(dev)->loopback_dev);
1da177e4
LT
1695 if (loopback_idev) {
1696 rt->idev = loopback_idev;
1697 in_dev_put(idev);
1698 }
1699 }
1700}
1701
1702static void ipv4_link_failure(struct sk_buff *skb)
1703{
1704 struct rtable *rt;
1705
1706 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_HOST_UNREACH, 0);
1707
511c3f92 1708 rt = skb_rtable(skb);
1da177e4
LT
1709 if (rt)
1710 dst_set_expires(&rt->u.dst, 0);
1711}
1712
1713static int ip_rt_bug(struct sk_buff *skb)
1714{
673d57e7
HH
1715 printk(KERN_DEBUG "ip_rt_bug: %pI4 -> %pI4, %s\n",
1716 &ip_hdr(skb)->saddr, &ip_hdr(skb)->daddr,
1da177e4
LT
1717 skb->dev ? skb->dev->name : "?");
1718 kfree_skb(skb);
1719 return 0;
1720}
1721
1722/*
1723 We do not cache source address of outgoing interface,
1724 because it is used only by IP RR, TS and SRR options,
1725 so that it out of fast path.
1726
1727 BTW remember: "addr" is allowed to be not aligned
1728 in IP options!
1729 */
1730
1731void ip_rt_get_source(u8 *addr, struct rtable *rt)
1732{
a61ced5d 1733 __be32 src;
1da177e4
LT
1734 struct fib_result res;
1735
1736 if (rt->fl.iif == 0)
1737 src = rt->rt_src;
c346dca1 1738 else if (fib_lookup(dev_net(rt->u.dst.dev), &rt->fl, &res) == 0) {
1da177e4
LT
1739 src = FIB_RES_PREFSRC(res);
1740 fib_res_put(&res);
1741 } else
1742 src = inet_select_addr(rt->u.dst.dev, rt->rt_gateway,
1743 RT_SCOPE_UNIVERSE);
1744 memcpy(addr, &src, 4);
1745}
1746
1747#ifdef CONFIG_NET_CLS_ROUTE
1748static void set_class_tag(struct rtable *rt, u32 tag)
1749{
1750 if (!(rt->u.dst.tclassid & 0xFFFF))
1751 rt->u.dst.tclassid |= tag & 0xFFFF;
1752 if (!(rt->u.dst.tclassid & 0xFFFF0000))
1753 rt->u.dst.tclassid |= tag & 0xFFFF0000;
1754}
1755#endif
1756
1757static void rt_set_nexthop(struct rtable *rt, struct fib_result *res, u32 itag)
1758{
1759 struct fib_info *fi = res->fi;
1760
1761 if (fi) {
1762 if (FIB_RES_GW(*res) &&
1763 FIB_RES_NH(*res).nh_scope == RT_SCOPE_LINK)
1764 rt->rt_gateway = FIB_RES_GW(*res);
1765 memcpy(rt->u.dst.metrics, fi->fib_metrics,
1766 sizeof(rt->u.dst.metrics));
1767 if (fi->fib_mtu == 0) {
1768 rt->u.dst.metrics[RTAX_MTU-1] = rt->u.dst.dev->mtu;
0bbeafd0 1769 if (dst_metric_locked(&rt->u.dst, RTAX_MTU) &&
1da177e4
LT
1770 rt->rt_gateway != rt->rt_dst &&
1771 rt->u.dst.dev->mtu > 576)
1772 rt->u.dst.metrics[RTAX_MTU-1] = 576;
1773 }
1774#ifdef CONFIG_NET_CLS_ROUTE
1775 rt->u.dst.tclassid = FIB_RES_NH(*res).nh_tclassid;
1776#endif
1777 } else
1778 rt->u.dst.metrics[RTAX_MTU-1]= rt->u.dst.dev->mtu;
1779
5ffc02a1 1780 if (dst_metric(&rt->u.dst, RTAX_HOPLIMIT) == 0)
1da177e4 1781 rt->u.dst.metrics[RTAX_HOPLIMIT-1] = sysctl_ip_default_ttl;
6d273f8d 1782 if (dst_mtu(&rt->u.dst) > IP_MAX_MTU)
1da177e4 1783 rt->u.dst.metrics[RTAX_MTU-1] = IP_MAX_MTU;
5ffc02a1 1784 if (dst_metric(&rt->u.dst, RTAX_ADVMSS) == 0)
1da177e4
LT
1785 rt->u.dst.metrics[RTAX_ADVMSS-1] = max_t(unsigned int, rt->u.dst.dev->mtu - 40,
1786 ip_rt_min_advmss);
5ffc02a1 1787 if (dst_metric(&rt->u.dst, RTAX_ADVMSS) > 65535 - 40)
1da177e4
LT
1788 rt->u.dst.metrics[RTAX_ADVMSS-1] = 65535 - 40;
1789
1790#ifdef CONFIG_NET_CLS_ROUTE
1791#ifdef CONFIG_IP_MULTIPLE_TABLES
1792 set_class_tag(rt, fib_rules_tclass(res));
1793#endif
1794 set_class_tag(rt, itag);
1795#endif
e905a9ed 1796 rt->rt_type = res->type;
1da177e4
LT
1797}
1798
9e12bb22 1799static int ip_route_input_mc(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1da177e4
LT
1800 u8 tos, struct net_device *dev, int our)
1801{
1802 unsigned hash;
1803 struct rtable *rth;
a61ced5d 1804 __be32 spec_dst;
1da177e4
LT
1805 struct in_device *in_dev = in_dev_get(dev);
1806 u32 itag = 0;
1807
1808 /* Primary sanity checks. */
1809
1810 if (in_dev == NULL)
1811 return -EINVAL;
1812
1e637c74 1813 if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr) ||
f97c1e0c 1814 ipv4_is_loopback(saddr) || skb->protocol != htons(ETH_P_IP))
1da177e4
LT
1815 goto e_inval;
1816
f97c1e0c
JP
1817 if (ipv4_is_zeronet(saddr)) {
1818 if (!ipv4_is_local_multicast(daddr))
1da177e4
LT
1819 goto e_inval;
1820 spec_dst = inet_select_addr(dev, 0, RT_SCOPE_LINK);
1821 } else if (fib_validate_source(saddr, 0, tos, 0,
1822 dev, &spec_dst, &itag) < 0)
1823 goto e_inval;
1824
1825 rth = dst_alloc(&ipv4_dst_ops);
1826 if (!rth)
1827 goto e_nobufs;
1828
1829 rth->u.dst.output= ip_rt_bug;
1830
1831 atomic_set(&rth->u.dst.__refcnt, 1);
1832 rth->u.dst.flags= DST_HOST;
42f811b8 1833 if (IN_DEV_CONF_GET(in_dev, NOPOLICY))
1da177e4
LT
1834 rth->u.dst.flags |= DST_NOPOLICY;
1835 rth->fl.fl4_dst = daddr;
1836 rth->rt_dst = daddr;
1837 rth->fl.fl4_tos = tos;
47dcf0cb 1838 rth->fl.mark = skb->mark;
1da177e4
LT
1839 rth->fl.fl4_src = saddr;
1840 rth->rt_src = saddr;
1841#ifdef CONFIG_NET_CLS_ROUTE
1842 rth->u.dst.tclassid = itag;
1843#endif
1844 rth->rt_iif =
1845 rth->fl.iif = dev->ifindex;
2774c7ab 1846 rth->u.dst.dev = init_net.loopback_dev;
1da177e4
LT
1847 dev_hold(rth->u.dst.dev);
1848 rth->idev = in_dev_get(rth->u.dst.dev);
1849 rth->fl.oif = 0;
1850 rth->rt_gateway = daddr;
1851 rth->rt_spec_dst= spec_dst;
e84f84f2 1852 rth->rt_genid = rt_genid(dev_net(dev));
1da177e4 1853 rth->rt_flags = RTCF_MULTICAST;
29e75252 1854 rth->rt_type = RTN_MULTICAST;
1da177e4
LT
1855 if (our) {
1856 rth->u.dst.input= ip_local_deliver;
1857 rth->rt_flags |= RTCF_LOCAL;
1858 }
1859
1860#ifdef CONFIG_IP_MROUTE
f97c1e0c 1861 if (!ipv4_is_local_multicast(daddr) && IN_DEV_MFORWARD(in_dev))
1da177e4
LT
1862 rth->u.dst.input = ip_mr_input;
1863#endif
1864 RT_CACHE_STAT_INC(in_slow_mc);
1865
1866 in_dev_put(in_dev);
e84f84f2 1867 hash = rt_hash(daddr, saddr, dev->ifindex, rt_genid(dev_net(dev)));
511c3f92 1868 return rt_intern_hash(hash, rth, NULL, skb);
1da177e4
LT
1869
1870e_nobufs:
1871 in_dev_put(in_dev);
1872 return -ENOBUFS;
1873
1874e_inval:
1875 in_dev_put(in_dev);
1876 return -EINVAL;
1877}
1878
1879
1880static void ip_handle_martian_source(struct net_device *dev,
1881 struct in_device *in_dev,
1882 struct sk_buff *skb,
9e12bb22
AV
1883 __be32 daddr,
1884 __be32 saddr)
1da177e4
LT
1885{
1886 RT_CACHE_STAT_INC(in_martian_src);
1887#ifdef CONFIG_IP_ROUTE_VERBOSE
1888 if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit()) {
1889 /*
1890 * RFC1812 recommendation, if source is martian,
1891 * the only hint is MAC header.
1892 */
673d57e7
HH
1893 printk(KERN_WARNING "martian source %pI4 from %pI4, on dev %s\n",
1894 &daddr, &saddr, dev->name);
98e399f8 1895 if (dev->hard_header_len && skb_mac_header_was_set(skb)) {
1da177e4 1896 int i;
98e399f8 1897 const unsigned char *p = skb_mac_header(skb);
1da177e4
LT
1898 printk(KERN_WARNING "ll header: ");
1899 for (i = 0; i < dev->hard_header_len; i++, p++) {
1900 printk("%02x", *p);
1901 if (i < (dev->hard_header_len - 1))
1902 printk(":");
1903 }
1904 printk("\n");
1905 }
1906 }
1907#endif
1908}
1909
5969f71d
SH
1910static int __mkroute_input(struct sk_buff *skb,
1911 struct fib_result *res,
1912 struct in_device *in_dev,
1913 __be32 daddr, __be32 saddr, u32 tos,
1914 struct rtable **result)
1da177e4
LT
1915{
1916
1917 struct rtable *rth;
1918 int err;
1919 struct in_device *out_dev;
1920 unsigned flags = 0;
d9c9df8c
AV
1921 __be32 spec_dst;
1922 u32 itag;
1da177e4
LT
1923
1924 /* get a working reference to the output device */
1925 out_dev = in_dev_get(FIB_RES_DEV(*res));
1926 if (out_dev == NULL) {
1927 if (net_ratelimit())
1928 printk(KERN_CRIT "Bug in ip_route_input" \
1929 "_slow(). Please, report\n");
1930 return -EINVAL;
1931 }
1932
1933
e905a9ed 1934 err = fib_validate_source(saddr, daddr, tos, FIB_RES_OIF(*res),
1da177e4
LT
1935 in_dev->dev, &spec_dst, &itag);
1936 if (err < 0) {
e905a9ed 1937 ip_handle_martian_source(in_dev->dev, in_dev, skb, daddr,
1da177e4 1938 saddr);
e905a9ed 1939
1da177e4
LT
1940 err = -EINVAL;
1941 goto cleanup;
1942 }
1943
1944 if (err)
1945 flags |= RTCF_DIRECTSRC;
1946
51b77cae 1947 if (out_dev == in_dev && err &&
1da177e4
LT
1948 (IN_DEV_SHARED_MEDIA(out_dev) ||
1949 inet_addr_onlink(out_dev, saddr, FIB_RES_GW(*res))))
1950 flags |= RTCF_DOREDIRECT;
1951
1952 if (skb->protocol != htons(ETH_P_IP)) {
1953 /* Not IP (i.e. ARP). Do not create route, if it is
1954 * invalid for proxy arp. DNAT routes are always valid.
1955 */
cb7928a5 1956 if (out_dev == in_dev) {
1da177e4
LT
1957 err = -EINVAL;
1958 goto cleanup;
1959 }
1960 }
1961
1962
1963 rth = dst_alloc(&ipv4_dst_ops);
1964 if (!rth) {
1965 err = -ENOBUFS;
1966 goto cleanup;
1967 }
1968
ce723d8e 1969 atomic_set(&rth->u.dst.__refcnt, 1);
1da177e4 1970 rth->u.dst.flags= DST_HOST;
42f811b8 1971 if (IN_DEV_CONF_GET(in_dev, NOPOLICY))
1da177e4 1972 rth->u.dst.flags |= DST_NOPOLICY;
42f811b8 1973 if (IN_DEV_CONF_GET(out_dev, NOXFRM))
1da177e4
LT
1974 rth->u.dst.flags |= DST_NOXFRM;
1975 rth->fl.fl4_dst = daddr;
1976 rth->rt_dst = daddr;
1977 rth->fl.fl4_tos = tos;
47dcf0cb 1978 rth->fl.mark = skb->mark;
1da177e4
LT
1979 rth->fl.fl4_src = saddr;
1980 rth->rt_src = saddr;
1981 rth->rt_gateway = daddr;
1982 rth->rt_iif =
1983 rth->fl.iif = in_dev->dev->ifindex;
1984 rth->u.dst.dev = (out_dev)->dev;
1985 dev_hold(rth->u.dst.dev);
1986 rth->idev = in_dev_get(rth->u.dst.dev);
1987 rth->fl.oif = 0;
1988 rth->rt_spec_dst= spec_dst;
1989
1990 rth->u.dst.input = ip_forward;
1991 rth->u.dst.output = ip_output;
e84f84f2 1992 rth->rt_genid = rt_genid(dev_net(rth->u.dst.dev));
1da177e4
LT
1993
1994 rt_set_nexthop(rth, res, itag);
1995
1996 rth->rt_flags = flags;
1997
1998 *result = rth;
1999 err = 0;
2000 cleanup:
2001 /* release the working reference to the output device */
2002 in_dev_put(out_dev);
2003 return err;
e905a9ed 2004}
1da177e4 2005
5969f71d
SH
2006static int ip_mkroute_input(struct sk_buff *skb,
2007 struct fib_result *res,
2008 const struct flowi *fl,
2009 struct in_device *in_dev,
2010 __be32 daddr, __be32 saddr, u32 tos)
1da177e4 2011{
7abaa27c 2012 struct rtable* rth = NULL;
1da177e4
LT
2013 int err;
2014 unsigned hash;
2015
2016#ifdef CONFIG_IP_ROUTE_MULTIPATH
2017 if (res->fi && res->fi->fib_nhs > 1 && fl->oif == 0)
2018 fib_select_multipath(fl, res);
2019#endif
2020
2021 /* create a routing cache entry */
2022 err = __mkroute_input(skb, res, in_dev, daddr, saddr, tos, &rth);
2023 if (err)
2024 return err;
1da177e4
LT
2025
2026 /* put it into the cache */
e84f84f2
DL
2027 hash = rt_hash(daddr, saddr, fl->iif,
2028 rt_genid(dev_net(rth->u.dst.dev)));
511c3f92 2029 return rt_intern_hash(hash, rth, NULL, skb);
1da177e4
LT
2030}
2031
1da177e4
LT
2032/*
2033 * NOTE. We drop all the packets that has local source
2034 * addresses, because every properly looped back packet
2035 * must have correct destination already attached by output routine.
2036 *
2037 * Such approach solves two big problems:
2038 * 1. Not simplex devices are handled properly.
2039 * 2. IP spoofing attempts are filtered with 100% of guarantee.
2040 */
2041
9e12bb22 2042static int ip_route_input_slow(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1da177e4
LT
2043 u8 tos, struct net_device *dev)
2044{
2045 struct fib_result res;
2046 struct in_device *in_dev = in_dev_get(dev);
2047 struct flowi fl = { .nl_u = { .ip4_u =
2048 { .daddr = daddr,
2049 .saddr = saddr,
2050 .tos = tos,
2051 .scope = RT_SCOPE_UNIVERSE,
1da177e4 2052 } },
47dcf0cb 2053 .mark = skb->mark,
1da177e4
LT
2054 .iif = dev->ifindex };
2055 unsigned flags = 0;
2056 u32 itag = 0;
2057 struct rtable * rth;
2058 unsigned hash;
9e12bb22 2059 __be32 spec_dst;
1da177e4
LT
2060 int err = -EINVAL;
2061 int free_res = 0;
c346dca1 2062 struct net * net = dev_net(dev);
1da177e4
LT
2063
2064 /* IP on this device is disabled. */
2065
2066 if (!in_dev)
2067 goto out;
2068
2069 /* Check for the most weird martians, which can be not detected
2070 by fib_lookup.
2071 */
2072
1e637c74 2073 if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr) ||
f97c1e0c 2074 ipv4_is_loopback(saddr))
1da177e4
LT
2075 goto martian_source;
2076
e448515c 2077 if (daddr == htonl(0xFFFFFFFF) || (saddr == 0 && daddr == 0))
1da177e4
LT
2078 goto brd_input;
2079
2080 /* Accept zero addresses only to limited broadcast;
2081 * I even do not know to fix it or not. Waiting for complains :-)
2082 */
f97c1e0c 2083 if (ipv4_is_zeronet(saddr))
1da177e4
LT
2084 goto martian_source;
2085
1e637c74 2086 if (ipv4_is_lbcast(daddr) || ipv4_is_zeronet(daddr) ||
f97c1e0c 2087 ipv4_is_loopback(daddr))
1da177e4
LT
2088 goto martian_destination;
2089
2090 /*
2091 * Now we are ready to route packet.
2092 */
84a885f4 2093 if ((err = fib_lookup(net, &fl, &res)) != 0) {
1da177e4 2094 if (!IN_DEV_FORWARD(in_dev))
2c2910a4 2095 goto e_hostunreach;
1da177e4
LT
2096 goto no_route;
2097 }
2098 free_res = 1;
2099
2100 RT_CACHE_STAT_INC(in_slow_tot);
2101
2102 if (res.type == RTN_BROADCAST)
2103 goto brd_input;
2104
2105 if (res.type == RTN_LOCAL) {
2106 int result;
2107 result = fib_validate_source(saddr, daddr, tos,
84a885f4 2108 net->loopback_dev->ifindex,
1da177e4
LT
2109 dev, &spec_dst, &itag);
2110 if (result < 0)
2111 goto martian_source;
2112 if (result)
2113 flags |= RTCF_DIRECTSRC;
2114 spec_dst = daddr;
2115 goto local_input;
2116 }
2117
2118 if (!IN_DEV_FORWARD(in_dev))
2c2910a4 2119 goto e_hostunreach;
1da177e4
LT
2120 if (res.type != RTN_UNICAST)
2121 goto martian_destination;
2122
2123 err = ip_mkroute_input(skb, &res, &fl, in_dev, daddr, saddr, tos);
1da177e4
LT
2124done:
2125 in_dev_put(in_dev);
2126 if (free_res)
2127 fib_res_put(&res);
2128out: return err;
2129
2130brd_input:
2131 if (skb->protocol != htons(ETH_P_IP))
2132 goto e_inval;
2133
f97c1e0c 2134 if (ipv4_is_zeronet(saddr))
1da177e4
LT
2135 spec_dst = inet_select_addr(dev, 0, RT_SCOPE_LINK);
2136 else {
2137 err = fib_validate_source(saddr, 0, tos, 0, dev, &spec_dst,
2138 &itag);
2139 if (err < 0)
2140 goto martian_source;
2141 if (err)
2142 flags |= RTCF_DIRECTSRC;
2143 }
2144 flags |= RTCF_BROADCAST;
2145 res.type = RTN_BROADCAST;
2146 RT_CACHE_STAT_INC(in_brd);
2147
2148local_input:
2149 rth = dst_alloc(&ipv4_dst_ops);
2150 if (!rth)
2151 goto e_nobufs;
2152
2153 rth->u.dst.output= ip_rt_bug;
e84f84f2 2154 rth->rt_genid = rt_genid(net);
1da177e4
LT
2155
2156 atomic_set(&rth->u.dst.__refcnt, 1);
2157 rth->u.dst.flags= DST_HOST;
42f811b8 2158 if (IN_DEV_CONF_GET(in_dev, NOPOLICY))
1da177e4
LT
2159 rth->u.dst.flags |= DST_NOPOLICY;
2160 rth->fl.fl4_dst = daddr;
2161 rth->rt_dst = daddr;
2162 rth->fl.fl4_tos = tos;
47dcf0cb 2163 rth->fl.mark = skb->mark;
1da177e4
LT
2164 rth->fl.fl4_src = saddr;
2165 rth->rt_src = saddr;
2166#ifdef CONFIG_NET_CLS_ROUTE
2167 rth->u.dst.tclassid = itag;
2168#endif
2169 rth->rt_iif =
2170 rth->fl.iif = dev->ifindex;
84a885f4 2171 rth->u.dst.dev = net->loopback_dev;
1da177e4
LT
2172 dev_hold(rth->u.dst.dev);
2173 rth->idev = in_dev_get(rth->u.dst.dev);
2174 rth->rt_gateway = daddr;
2175 rth->rt_spec_dst= spec_dst;
2176 rth->u.dst.input= ip_local_deliver;
2177 rth->rt_flags = flags|RTCF_LOCAL;
2178 if (res.type == RTN_UNREACHABLE) {
2179 rth->u.dst.input= ip_error;
2180 rth->u.dst.error= -err;
2181 rth->rt_flags &= ~RTCF_LOCAL;
2182 }
2183 rth->rt_type = res.type;
e84f84f2 2184 hash = rt_hash(daddr, saddr, fl.iif, rt_genid(net));
511c3f92 2185 err = rt_intern_hash(hash, rth, NULL, skb);
1da177e4
LT
2186 goto done;
2187
2188no_route:
2189 RT_CACHE_STAT_INC(in_no_route);
2190 spec_dst = inet_select_addr(dev, 0, RT_SCOPE_UNIVERSE);
2191 res.type = RTN_UNREACHABLE;
7f53878d
MC
2192 if (err == -ESRCH)
2193 err = -ENETUNREACH;
1da177e4
LT
2194 goto local_input;
2195
2196 /*
2197 * Do not cache martian addresses: they should be logged (RFC1812)
2198 */
2199martian_destination:
2200 RT_CACHE_STAT_INC(in_martian_dst);
2201#ifdef CONFIG_IP_ROUTE_VERBOSE
2202 if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit())
673d57e7
HH
2203 printk(KERN_WARNING "martian destination %pI4 from %pI4, dev %s\n",
2204 &daddr, &saddr, dev->name);
1da177e4 2205#endif
2c2910a4
DE
2206
2207e_hostunreach:
e905a9ed
YH
2208 err = -EHOSTUNREACH;
2209 goto done;
2c2910a4 2210
1da177e4
LT
2211e_inval:
2212 err = -EINVAL;
2213 goto done;
2214
2215e_nobufs:
2216 err = -ENOBUFS;
2217 goto done;
2218
2219martian_source:
2220 ip_handle_martian_source(dev, in_dev, skb, daddr, saddr);
2221 goto e_inval;
2222}
2223
9e12bb22 2224int ip_route_input(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1da177e4
LT
2225 u8 tos, struct net_device *dev)
2226{
2227 struct rtable * rth;
2228 unsigned hash;
2229 int iif = dev->ifindex;
b5921910 2230 struct net *net;
1da177e4 2231
c346dca1 2232 net = dev_net(dev);
1080d709
NH
2233
2234 if (!rt_caching(net))
2235 goto skip_cache;
2236
1da177e4 2237 tos &= IPTOS_RT_MASK;
e84f84f2 2238 hash = rt_hash(daddr, saddr, iif, rt_genid(net));
1da177e4
LT
2239
2240 rcu_read_lock();
2241 for (rth = rcu_dereference(rt_hash_table[hash].chain); rth;
093c2ca4 2242 rth = rcu_dereference(rth->u.dst.rt_next)) {
c0b8c32b
SH
2243 if (((rth->fl.fl4_dst ^ daddr) |
2244 (rth->fl.fl4_src ^ saddr) |
2245 (rth->fl.iif ^ iif) |
2246 rth->fl.oif |
2247 (rth->fl.fl4_tos ^ tos)) == 0 &&
47dcf0cb 2248 rth->fl.mark == skb->mark &&
878628fb 2249 net_eq(dev_net(rth->u.dst.dev), net) &&
e84f84f2 2250 !rt_is_expired(rth)) {
03f49f34 2251 dst_use(&rth->u.dst, jiffies);
1da177e4
LT
2252 RT_CACHE_STAT_INC(in_hit);
2253 rcu_read_unlock();
511c3f92 2254 skb->dst = &rth->u.dst;
1da177e4
LT
2255 return 0;
2256 }
2257 RT_CACHE_STAT_INC(in_hlist_search);
2258 }
2259 rcu_read_unlock();
2260
1080d709 2261skip_cache:
1da177e4
LT
2262 /* Multicast recognition logic is moved from route cache to here.
2263 The problem was that too many Ethernet cards have broken/missing
2264 hardware multicast filters :-( As result the host on multicasting
2265 network acquires a lot of useless route cache entries, sort of
2266 SDR messages from all the world. Now we try to get rid of them.
2267 Really, provided software IP multicast filter is organized
2268 reasonably (at least, hashed), it does not result in a slowdown
2269 comparing with route cache reject entries.
2270 Note, that multicast routers are not affected, because
2271 route cache entry is created eventually.
2272 */
f97c1e0c 2273 if (ipv4_is_multicast(daddr)) {
1da177e4
LT
2274 struct in_device *in_dev;
2275
2276 rcu_read_lock();
e5ed6399 2277 if ((in_dev = __in_dev_get_rcu(dev)) != NULL) {
1da177e4 2278 int our = ip_check_mc(in_dev, daddr, saddr,
eddc9ec5 2279 ip_hdr(skb)->protocol);
1da177e4
LT
2280 if (our
2281#ifdef CONFIG_IP_MROUTE
f97c1e0c
JP
2282 || (!ipv4_is_local_multicast(daddr) &&
2283 IN_DEV_MFORWARD(in_dev))
1da177e4
LT
2284#endif
2285 ) {
2286 rcu_read_unlock();
2287 return ip_route_input_mc(skb, daddr, saddr,
2288 tos, dev, our);
2289 }
2290 }
2291 rcu_read_unlock();
2292 return -EINVAL;
2293 }
2294 return ip_route_input_slow(skb, daddr, saddr, tos, dev);
2295}
2296
5969f71d
SH
2297static int __mkroute_output(struct rtable **result,
2298 struct fib_result *res,
2299 const struct flowi *fl,
2300 const struct flowi *oldflp,
2301 struct net_device *dev_out,
2302 unsigned flags)
1da177e4
LT
2303{
2304 struct rtable *rth;
2305 struct in_device *in_dev;
2306 u32 tos = RT_FL_TOS(oldflp);
2307 int err = 0;
2308
f97c1e0c 2309 if (ipv4_is_loopback(fl->fl4_src) && !(dev_out->flags&IFF_LOOPBACK))
1da177e4
LT
2310 return -EINVAL;
2311
e448515c 2312 if (fl->fl4_dst == htonl(0xFFFFFFFF))
1da177e4 2313 res->type = RTN_BROADCAST;
f97c1e0c 2314 else if (ipv4_is_multicast(fl->fl4_dst))
1da177e4 2315 res->type = RTN_MULTICAST;
1e637c74 2316 else if (ipv4_is_lbcast(fl->fl4_dst) || ipv4_is_zeronet(fl->fl4_dst))
1da177e4
LT
2317 return -EINVAL;
2318
2319 if (dev_out->flags & IFF_LOOPBACK)
2320 flags |= RTCF_LOCAL;
2321
2322 /* get work reference to inet device */
2323 in_dev = in_dev_get(dev_out);
2324 if (!in_dev)
2325 return -EINVAL;
2326
2327 if (res->type == RTN_BROADCAST) {
2328 flags |= RTCF_BROADCAST | RTCF_LOCAL;
2329 if (res->fi) {
2330 fib_info_put(res->fi);
2331 res->fi = NULL;
2332 }
2333 } else if (res->type == RTN_MULTICAST) {
2334 flags |= RTCF_MULTICAST|RTCF_LOCAL;
e905a9ed 2335 if (!ip_check_mc(in_dev, oldflp->fl4_dst, oldflp->fl4_src,
1da177e4
LT
2336 oldflp->proto))
2337 flags &= ~RTCF_LOCAL;
2338 /* If multicast route do not exist use
2339 default one, but do not gateway in this case.
2340 Yes, it is hack.
2341 */
2342 if (res->fi && res->prefixlen < 4) {
2343 fib_info_put(res->fi);
2344 res->fi = NULL;
2345 }
2346 }
2347
2348
2349 rth = dst_alloc(&ipv4_dst_ops);
2350 if (!rth) {
2351 err = -ENOBUFS;
2352 goto cleanup;
e905a9ed 2353 }
1da177e4 2354
ce723d8e 2355 atomic_set(&rth->u.dst.__refcnt, 1);
1da177e4 2356 rth->u.dst.flags= DST_HOST;
42f811b8 2357 if (IN_DEV_CONF_GET(in_dev, NOXFRM))
1da177e4 2358 rth->u.dst.flags |= DST_NOXFRM;
42f811b8 2359 if (IN_DEV_CONF_GET(in_dev, NOPOLICY))
1da177e4
LT
2360 rth->u.dst.flags |= DST_NOPOLICY;
2361
2362 rth->fl.fl4_dst = oldflp->fl4_dst;
2363 rth->fl.fl4_tos = tos;
2364 rth->fl.fl4_src = oldflp->fl4_src;
2365 rth->fl.oif = oldflp->oif;
47dcf0cb 2366 rth->fl.mark = oldflp->mark;
1da177e4
LT
2367 rth->rt_dst = fl->fl4_dst;
2368 rth->rt_src = fl->fl4_src;
2369 rth->rt_iif = oldflp->oif ? : dev_out->ifindex;
e905a9ed 2370 /* get references to the devices that are to be hold by the routing
1da177e4
LT
2371 cache entry */
2372 rth->u.dst.dev = dev_out;
2373 dev_hold(dev_out);
2374 rth->idev = in_dev_get(dev_out);
2375 rth->rt_gateway = fl->fl4_dst;
2376 rth->rt_spec_dst= fl->fl4_src;
2377
2378 rth->u.dst.output=ip_output;
e84f84f2 2379 rth->rt_genid = rt_genid(dev_net(dev_out));
1da177e4
LT
2380
2381 RT_CACHE_STAT_INC(out_slow_tot);
2382
2383 if (flags & RTCF_LOCAL) {
2384 rth->u.dst.input = ip_local_deliver;
2385 rth->rt_spec_dst = fl->fl4_dst;
2386 }
2387 if (flags & (RTCF_BROADCAST | RTCF_MULTICAST)) {
2388 rth->rt_spec_dst = fl->fl4_src;
e905a9ed 2389 if (flags & RTCF_LOCAL &&
1da177e4
LT
2390 !(dev_out->flags & IFF_LOOPBACK)) {
2391 rth->u.dst.output = ip_mc_output;
2392 RT_CACHE_STAT_INC(out_slow_mc);
2393 }
2394#ifdef CONFIG_IP_MROUTE
2395 if (res->type == RTN_MULTICAST) {
2396 if (IN_DEV_MFORWARD(in_dev) &&
f97c1e0c 2397 !ipv4_is_local_multicast(oldflp->fl4_dst)) {
1da177e4
LT
2398 rth->u.dst.input = ip_mr_input;
2399 rth->u.dst.output = ip_mc_output;
2400 }
2401 }
2402#endif
2403 }
2404
2405 rt_set_nexthop(rth, res, 0);
2406
2407 rth->rt_flags = flags;
2408
2409 *result = rth;
2410 cleanup:
2411 /* release work reference to inet device */
2412 in_dev_put(in_dev);
2413
2414 return err;
2415}
2416
5969f71d
SH
2417static int ip_mkroute_output(struct rtable **rp,
2418 struct fib_result *res,
2419 const struct flowi *fl,
2420 const struct flowi *oldflp,
2421 struct net_device *dev_out,
2422 unsigned flags)
1da177e4 2423{
7abaa27c 2424 struct rtable *rth = NULL;
1da177e4
LT
2425 int err = __mkroute_output(&rth, res, fl, oldflp, dev_out, flags);
2426 unsigned hash;
2427 if (err == 0) {
b00180de 2428 hash = rt_hash(oldflp->fl4_dst, oldflp->fl4_src, oldflp->oif,
e84f84f2 2429 rt_genid(dev_net(dev_out)));
511c3f92 2430 err = rt_intern_hash(hash, rth, rp, NULL);
1da177e4 2431 }
e905a9ed 2432
1da177e4
LT
2433 return err;
2434}
2435
1da177e4
LT
2436/*
2437 * Major route resolver routine.
2438 */
2439
b40afd0e
DL
2440static int ip_route_output_slow(struct net *net, struct rtable **rp,
2441 const struct flowi *oldflp)
1da177e4
LT
2442{
2443 u32 tos = RT_FL_TOS(oldflp);
2444 struct flowi fl = { .nl_u = { .ip4_u =
2445 { .daddr = oldflp->fl4_dst,
2446 .saddr = oldflp->fl4_src,
2447 .tos = tos & IPTOS_RT_MASK,
2448 .scope = ((tos & RTO_ONLINK) ?
2449 RT_SCOPE_LINK :
2450 RT_SCOPE_UNIVERSE),
1da177e4 2451 } },
47dcf0cb 2452 .mark = oldflp->mark,
b40afd0e 2453 .iif = net->loopback_dev->ifindex,
1da177e4
LT
2454 .oif = oldflp->oif };
2455 struct fib_result res;
2456 unsigned flags = 0;
2457 struct net_device *dev_out = NULL;
2458 int free_res = 0;
2459 int err;
2460
2461
2462 res.fi = NULL;
2463#ifdef CONFIG_IP_MULTIPLE_TABLES
2464 res.r = NULL;
2465#endif
2466
2467 if (oldflp->fl4_src) {
2468 err = -EINVAL;
f97c1e0c 2469 if (ipv4_is_multicast(oldflp->fl4_src) ||
1e637c74 2470 ipv4_is_lbcast(oldflp->fl4_src) ||
f97c1e0c 2471 ipv4_is_zeronet(oldflp->fl4_src))
1da177e4
LT
2472 goto out;
2473
1da177e4
LT
2474 /* I removed check for oif == dev_out->oif here.
2475 It was wrong for two reasons:
1ab35276
DL
2476 1. ip_dev_find(net, saddr) can return wrong iface, if saddr
2477 is assigned to multiple interfaces.
1da177e4
LT
2478 2. Moreover, we are allowed to send packets with saddr
2479 of another iface. --ANK
2480 */
2481
f6c5d736 2482 if (oldflp->oif == 0
f97c1e0c
JP
2483 && (ipv4_is_multicast(oldflp->fl4_dst) ||
2484 oldflp->fl4_dst == htonl(0xFFFFFFFF))) {
a210d01a
JA
2485 /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */
2486 dev_out = ip_dev_find(net, oldflp->fl4_src);
2487 if (dev_out == NULL)
2488 goto out;
2489
1da177e4
LT
2490 /* Special hack: user can direct multicasts
2491 and limited broadcast via necessary interface
2492 without fiddling with IP_MULTICAST_IF or IP_PKTINFO.
2493 This hack is not just for fun, it allows
2494 vic,vat and friends to work.
2495 They bind socket to loopback, set ttl to zero
2496 and expect that it will work.
2497 From the viewpoint of routing cache they are broken,
2498 because we are not allowed to build multicast path
2499 with loopback source addr (look, routing cache
2500 cannot know, that ttl is zero, so that packet
2501 will not leave this host and route is valid).
2502 Luckily, this hack is good workaround.
2503 */
2504
2505 fl.oif = dev_out->ifindex;
2506 goto make_route;
2507 }
a210d01a
JA
2508
2509 if (!(oldflp->flags & FLOWI_FLAG_ANYSRC)) {
2510 /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */
2511 dev_out = ip_dev_find(net, oldflp->fl4_src);
2512 if (dev_out == NULL)
2513 goto out;
1da177e4 2514 dev_put(dev_out);
a210d01a
JA
2515 dev_out = NULL;
2516 }
1da177e4
LT
2517 }
2518
2519
2520 if (oldflp->oif) {
b40afd0e 2521 dev_out = dev_get_by_index(net, oldflp->oif);
1da177e4
LT
2522 err = -ENODEV;
2523 if (dev_out == NULL)
2524 goto out;
e5ed6399
HX
2525
2526 /* RACE: Check return value of inet_select_addr instead. */
2527 if (__in_dev_get_rtnl(dev_out) == NULL) {
1da177e4
LT
2528 dev_put(dev_out);
2529 goto out; /* Wrong error code */
2530 }
2531
f97c1e0c
JP
2532 if (ipv4_is_local_multicast(oldflp->fl4_dst) ||
2533 oldflp->fl4_dst == htonl(0xFFFFFFFF)) {
1da177e4
LT
2534 if (!fl.fl4_src)
2535 fl.fl4_src = inet_select_addr(dev_out, 0,
2536 RT_SCOPE_LINK);
2537 goto make_route;
2538 }
2539 if (!fl.fl4_src) {
f97c1e0c 2540 if (ipv4_is_multicast(oldflp->fl4_dst))
1da177e4
LT
2541 fl.fl4_src = inet_select_addr(dev_out, 0,
2542 fl.fl4_scope);
2543 else if (!oldflp->fl4_dst)
2544 fl.fl4_src = inet_select_addr(dev_out, 0,
2545 RT_SCOPE_HOST);
2546 }
2547 }
2548
2549 if (!fl.fl4_dst) {
2550 fl.fl4_dst = fl.fl4_src;
2551 if (!fl.fl4_dst)
2552 fl.fl4_dst = fl.fl4_src = htonl(INADDR_LOOPBACK);
2553 if (dev_out)
2554 dev_put(dev_out);
b40afd0e 2555 dev_out = net->loopback_dev;
1da177e4 2556 dev_hold(dev_out);
b40afd0e 2557 fl.oif = net->loopback_dev->ifindex;
1da177e4
LT
2558 res.type = RTN_LOCAL;
2559 flags |= RTCF_LOCAL;
2560 goto make_route;
2561 }
2562
b40afd0e 2563 if (fib_lookup(net, &fl, &res)) {
1da177e4
LT
2564 res.fi = NULL;
2565 if (oldflp->oif) {
2566 /* Apparently, routing tables are wrong. Assume,
2567 that the destination is on link.
2568
2569 WHY? DW.
2570 Because we are allowed to send to iface
2571 even if it has NO routes and NO assigned
2572 addresses. When oif is specified, routing
2573 tables are looked up with only one purpose:
2574 to catch if destination is gatewayed, rather than
2575 direct. Moreover, if MSG_DONTROUTE is set,
2576 we send packet, ignoring both routing tables
2577 and ifaddr state. --ANK
2578
2579
2580 We could make it even if oif is unknown,
2581 likely IPv6, but we do not.
2582 */
2583
2584 if (fl.fl4_src == 0)
2585 fl.fl4_src = inet_select_addr(dev_out, 0,
2586 RT_SCOPE_LINK);
2587 res.type = RTN_UNICAST;
2588 goto make_route;
2589 }
2590 if (dev_out)
2591 dev_put(dev_out);
2592 err = -ENETUNREACH;
2593 goto out;
2594 }
2595 free_res = 1;
2596
2597 if (res.type == RTN_LOCAL) {
2598 if (!fl.fl4_src)
2599 fl.fl4_src = fl.fl4_dst;
2600 if (dev_out)
2601 dev_put(dev_out);
b40afd0e 2602 dev_out = net->loopback_dev;
1da177e4
LT
2603 dev_hold(dev_out);
2604 fl.oif = dev_out->ifindex;
2605 if (res.fi)
2606 fib_info_put(res.fi);
2607 res.fi = NULL;
2608 flags |= RTCF_LOCAL;
2609 goto make_route;
2610 }
2611
2612#ifdef CONFIG_IP_ROUTE_MULTIPATH
2613 if (res.fi->fib_nhs > 1 && fl.oif == 0)
2614 fib_select_multipath(&fl, &res);
2615 else
2616#endif
2617 if (!res.prefixlen && res.type == RTN_UNICAST && !fl.oif)
b40afd0e 2618 fib_select_default(net, &fl, &res);
1da177e4
LT
2619
2620 if (!fl.fl4_src)
2621 fl.fl4_src = FIB_RES_PREFSRC(res);
2622
2623 if (dev_out)
2624 dev_put(dev_out);
2625 dev_out = FIB_RES_DEV(res);
2626 dev_hold(dev_out);
2627 fl.oif = dev_out->ifindex;
2628
2629
2630make_route:
2631 err = ip_mkroute_output(rp, &res, &fl, oldflp, dev_out, flags);
2632
2633
2634 if (free_res)
2635 fib_res_put(&res);
2636 if (dev_out)
2637 dev_put(dev_out);
2638out: return err;
2639}
2640
611c183e
DL
2641int __ip_route_output_key(struct net *net, struct rtable **rp,
2642 const struct flowi *flp)
1da177e4
LT
2643{
2644 unsigned hash;
2645 struct rtable *rth;
2646
1080d709
NH
2647 if (!rt_caching(net))
2648 goto slow_output;
2649
e84f84f2 2650 hash = rt_hash(flp->fl4_dst, flp->fl4_src, flp->oif, rt_genid(net));
1da177e4
LT
2651
2652 rcu_read_lock_bh();
2653 for (rth = rcu_dereference(rt_hash_table[hash].chain); rth;
093c2ca4 2654 rth = rcu_dereference(rth->u.dst.rt_next)) {
1da177e4
LT
2655 if (rth->fl.fl4_dst == flp->fl4_dst &&
2656 rth->fl.fl4_src == flp->fl4_src &&
2657 rth->fl.iif == 0 &&
2658 rth->fl.oif == flp->oif &&
47dcf0cb 2659 rth->fl.mark == flp->mark &&
1da177e4 2660 !((rth->fl.fl4_tos ^ flp->fl4_tos) &
b5921910 2661 (IPTOS_RT_MASK | RTO_ONLINK)) &&
878628fb 2662 net_eq(dev_net(rth->u.dst.dev), net) &&
e84f84f2 2663 !rt_is_expired(rth)) {
03f49f34 2664 dst_use(&rth->u.dst, jiffies);
1da177e4
LT
2665 RT_CACHE_STAT_INC(out_hit);
2666 rcu_read_unlock_bh();
2667 *rp = rth;
2668 return 0;
2669 }
2670 RT_CACHE_STAT_INC(out_hlist_search);
2671 }
2672 rcu_read_unlock_bh();
2673
1080d709 2674slow_output:
611c183e 2675 return ip_route_output_slow(net, rp, flp);
1da177e4
LT
2676}
2677
d8c97a94
ACM
2678EXPORT_SYMBOL_GPL(__ip_route_output_key);
2679
14e50e57
DM
2680static void ipv4_rt_blackhole_update_pmtu(struct dst_entry *dst, u32 mtu)
2681{
2682}
2683
2684static struct dst_ops ipv4_dst_blackhole_ops = {
2685 .family = AF_INET,
09640e63 2686 .protocol = cpu_to_be16(ETH_P_IP),
14e50e57
DM
2687 .destroy = ipv4_dst_destroy,
2688 .check = ipv4_dst_check,
2689 .update_pmtu = ipv4_rt_blackhole_update_pmtu,
e2422970 2690 .entries = ATOMIC_INIT(0),
14e50e57
DM
2691};
2692
2693
e84f84f2 2694static int ipv4_dst_blackhole(struct net *net, struct rtable **rp, struct flowi *flp)
14e50e57
DM
2695{
2696 struct rtable *ort = *rp;
2697 struct rtable *rt = (struct rtable *)
2698 dst_alloc(&ipv4_dst_blackhole_ops);
2699
2700 if (rt) {
2701 struct dst_entry *new = &rt->u.dst;
2702
2703 atomic_set(&new->__refcnt, 1);
2704 new->__use = 1;
352e512c
HX
2705 new->input = dst_discard;
2706 new->output = dst_discard;
14e50e57
DM
2707 memcpy(new->metrics, ort->u.dst.metrics, RTAX_MAX*sizeof(u32));
2708
2709 new->dev = ort->u.dst.dev;
2710 if (new->dev)
2711 dev_hold(new->dev);
2712
2713 rt->fl = ort->fl;
2714
2715 rt->idev = ort->idev;
2716 if (rt->idev)
2717 in_dev_hold(rt->idev);
e84f84f2 2718 rt->rt_genid = rt_genid(net);
14e50e57
DM
2719 rt->rt_flags = ort->rt_flags;
2720 rt->rt_type = ort->rt_type;
2721 rt->rt_dst = ort->rt_dst;
2722 rt->rt_src = ort->rt_src;
2723 rt->rt_iif = ort->rt_iif;
2724 rt->rt_gateway = ort->rt_gateway;
2725 rt->rt_spec_dst = ort->rt_spec_dst;
2726 rt->peer = ort->peer;
2727 if (rt->peer)
2728 atomic_inc(&rt->peer->refcnt);
2729
2730 dst_free(new);
2731 }
2732
2733 dst_release(&(*rp)->u.dst);
2734 *rp = rt;
2735 return (rt ? 0 : -ENOMEM);
2736}
2737
f1b050bf
DL
2738int ip_route_output_flow(struct net *net, struct rtable **rp, struct flowi *flp,
2739 struct sock *sk, int flags)
1da177e4
LT
2740{
2741 int err;
2742
f1b050bf 2743 if ((err = __ip_route_output_key(net, rp, flp)) != 0)
1da177e4
LT
2744 return err;
2745
2746 if (flp->proto) {
2747 if (!flp->fl4_src)
2748 flp->fl4_src = (*rp)->rt_src;
2749 if (!flp->fl4_dst)
2750 flp->fl4_dst = (*rp)->rt_dst;
52479b62 2751 err = __xfrm_lookup(net, (struct dst_entry **)rp, flp, sk,
bb72845e 2752 flags ? XFRM_LOOKUP_WAIT : 0);
14e50e57 2753 if (err == -EREMOTE)
e84f84f2 2754 err = ipv4_dst_blackhole(net, rp, flp);
14e50e57
DM
2755
2756 return err;
1da177e4
LT
2757 }
2758
2759 return 0;
2760}
2761
d8c97a94
ACM
2762EXPORT_SYMBOL_GPL(ip_route_output_flow);
2763
f206351a 2764int ip_route_output_key(struct net *net, struct rtable **rp, struct flowi *flp)
1da177e4 2765{
f206351a 2766 return ip_route_output_flow(net, rp, flp, NULL, 0);
1da177e4
LT
2767}
2768
4feb88e5
BT
2769static int rt_fill_info(struct net *net,
2770 struct sk_buff *skb, u32 pid, u32 seq, int event,
b6544c0b 2771 int nowait, unsigned int flags)
1da177e4 2772{
511c3f92 2773 struct rtable *rt = skb_rtable(skb);
1da177e4 2774 struct rtmsg *r;
be403ea1 2775 struct nlmsghdr *nlh;
e3703b3d
TG
2776 long expires;
2777 u32 id = 0, ts = 0, tsage = 0, error;
be403ea1
TG
2778
2779 nlh = nlmsg_put(skb, pid, seq, event, sizeof(*r), flags);
2780 if (nlh == NULL)
26932566 2781 return -EMSGSIZE;
be403ea1
TG
2782
2783 r = nlmsg_data(nlh);
1da177e4
LT
2784 r->rtm_family = AF_INET;
2785 r->rtm_dst_len = 32;
2786 r->rtm_src_len = 0;
2787 r->rtm_tos = rt->fl.fl4_tos;
2788 r->rtm_table = RT_TABLE_MAIN;
be403ea1 2789 NLA_PUT_U32(skb, RTA_TABLE, RT_TABLE_MAIN);
1da177e4
LT
2790 r->rtm_type = rt->rt_type;
2791 r->rtm_scope = RT_SCOPE_UNIVERSE;
2792 r->rtm_protocol = RTPROT_UNSPEC;
2793 r->rtm_flags = (rt->rt_flags & ~0xFFFF) | RTM_F_CLONED;
2794 if (rt->rt_flags & RTCF_NOTIFY)
2795 r->rtm_flags |= RTM_F_NOTIFY;
be403ea1 2796
17fb2c64 2797 NLA_PUT_BE32(skb, RTA_DST, rt->rt_dst);
be403ea1 2798
1da177e4
LT
2799 if (rt->fl.fl4_src) {
2800 r->rtm_src_len = 32;
17fb2c64 2801 NLA_PUT_BE32(skb, RTA_SRC, rt->fl.fl4_src);
1da177e4
LT
2802 }
2803 if (rt->u.dst.dev)
be403ea1 2804 NLA_PUT_U32(skb, RTA_OIF, rt->u.dst.dev->ifindex);
1da177e4
LT
2805#ifdef CONFIG_NET_CLS_ROUTE
2806 if (rt->u.dst.tclassid)
be403ea1 2807 NLA_PUT_U32(skb, RTA_FLOW, rt->u.dst.tclassid);
1da177e4
LT
2808#endif
2809 if (rt->fl.iif)
17fb2c64 2810 NLA_PUT_BE32(skb, RTA_PREFSRC, rt->rt_spec_dst);
1da177e4 2811 else if (rt->rt_src != rt->fl.fl4_src)
17fb2c64 2812 NLA_PUT_BE32(skb, RTA_PREFSRC, rt->rt_src);
be403ea1 2813
1da177e4 2814 if (rt->rt_dst != rt->rt_gateway)
17fb2c64 2815 NLA_PUT_BE32(skb, RTA_GATEWAY, rt->rt_gateway);
be403ea1 2816
1da177e4 2817 if (rtnetlink_put_metrics(skb, rt->u.dst.metrics) < 0)
be403ea1
TG
2818 goto nla_put_failure;
2819
e3703b3d
TG
2820 error = rt->u.dst.error;
2821 expires = rt->u.dst.expires ? rt->u.dst.expires - jiffies : 0;
1da177e4 2822 if (rt->peer) {
e3703b3d 2823 id = rt->peer->ip_id_count;
1da177e4 2824 if (rt->peer->tcp_ts_stamp) {
e3703b3d 2825 ts = rt->peer->tcp_ts;
9d729f72 2826 tsage = get_seconds() - rt->peer->tcp_ts_stamp;
1da177e4
LT
2827 }
2828 }
be403ea1 2829
1da177e4
LT
2830 if (rt->fl.iif) {
2831#ifdef CONFIG_IP_MROUTE
e448515c 2832 __be32 dst = rt->rt_dst;
1da177e4 2833
f97c1e0c 2834 if (ipv4_is_multicast(dst) && !ipv4_is_local_multicast(dst) &&
4feb88e5
BT
2835 IPV4_DEVCONF_ALL(net, MC_FORWARDING)) {
2836 int err = ipmr_get_route(net, skb, r, nowait);
1da177e4
LT
2837 if (err <= 0) {
2838 if (!nowait) {
2839 if (err == 0)
2840 return 0;
be403ea1 2841 goto nla_put_failure;
1da177e4
LT
2842 } else {
2843 if (err == -EMSGSIZE)
be403ea1 2844 goto nla_put_failure;
e3703b3d 2845 error = err;
1da177e4
LT
2846 }
2847 }
2848 } else
2849#endif
be403ea1 2850 NLA_PUT_U32(skb, RTA_IIF, rt->fl.iif);
1da177e4
LT
2851 }
2852
e3703b3d
TG
2853 if (rtnl_put_cacheinfo(skb, &rt->u.dst, id, ts, tsage,
2854 expires, error) < 0)
2855 goto nla_put_failure;
be403ea1
TG
2856
2857 return nlmsg_end(skb, nlh);
1da177e4 2858
be403ea1 2859nla_put_failure:
26932566
PM
2860 nlmsg_cancel(skb, nlh);
2861 return -EMSGSIZE;
1da177e4
LT
2862}
2863
63f3444f 2864static int inet_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr* nlh, void *arg)
1da177e4 2865{
3b1e0a65 2866 struct net *net = sock_net(in_skb->sk);
d889ce3b
TG
2867 struct rtmsg *rtm;
2868 struct nlattr *tb[RTA_MAX+1];
1da177e4 2869 struct rtable *rt = NULL;
9e12bb22
AV
2870 __be32 dst = 0;
2871 __be32 src = 0;
2872 u32 iif;
d889ce3b 2873 int err;
1da177e4
LT
2874 struct sk_buff *skb;
2875
d889ce3b
TG
2876 err = nlmsg_parse(nlh, sizeof(*rtm), tb, RTA_MAX, rtm_ipv4_policy);
2877 if (err < 0)
2878 goto errout;
2879
2880 rtm = nlmsg_data(nlh);
2881
1da177e4 2882 skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
d889ce3b
TG
2883 if (skb == NULL) {
2884 err = -ENOBUFS;
2885 goto errout;
2886 }
1da177e4
LT
2887
2888 /* Reserve room for dummy headers, this skb can pass
2889 through good chunk of routing engine.
2890 */
459a98ed 2891 skb_reset_mac_header(skb);
c1d2bbe1 2892 skb_reset_network_header(skb);
d2c962b8
SH
2893
2894 /* Bugfix: need to give ip_route_input enough of an IP header to not gag. */
eddc9ec5 2895 ip_hdr(skb)->protocol = IPPROTO_ICMP;
1da177e4
LT
2896 skb_reserve(skb, MAX_HEADER + sizeof(struct iphdr));
2897
17fb2c64
AV
2898 src = tb[RTA_SRC] ? nla_get_be32(tb[RTA_SRC]) : 0;
2899 dst = tb[RTA_DST] ? nla_get_be32(tb[RTA_DST]) : 0;
d889ce3b 2900 iif = tb[RTA_IIF] ? nla_get_u32(tb[RTA_IIF]) : 0;
1da177e4
LT
2901
2902 if (iif) {
d889ce3b
TG
2903 struct net_device *dev;
2904
1937504d 2905 dev = __dev_get_by_index(net, iif);
d889ce3b
TG
2906 if (dev == NULL) {
2907 err = -ENODEV;
2908 goto errout_free;
2909 }
2910
1da177e4
LT
2911 skb->protocol = htons(ETH_P_IP);
2912 skb->dev = dev;
2913 local_bh_disable();
2914 err = ip_route_input(skb, dst, src, rtm->rtm_tos, dev);
2915 local_bh_enable();
d889ce3b 2916
511c3f92 2917 rt = skb_rtable(skb);
d889ce3b 2918 if (err == 0 && rt->u.dst.error)
1da177e4
LT
2919 err = -rt->u.dst.error;
2920 } else {
d889ce3b
TG
2921 struct flowi fl = {
2922 .nl_u = {
2923 .ip4_u = {
2924 .daddr = dst,
2925 .saddr = src,
2926 .tos = rtm->rtm_tos,
2927 },
2928 },
2929 .oif = tb[RTA_OIF] ? nla_get_u32(tb[RTA_OIF]) : 0,
2930 };
1937504d 2931 err = ip_route_output_key(net, &rt, &fl);
1da177e4 2932 }
d889ce3b 2933
1da177e4 2934 if (err)
d889ce3b 2935 goto errout_free;
1da177e4 2936
511c3f92 2937 skb->dst = &rt->u.dst;
1da177e4
LT
2938 if (rtm->rtm_flags & RTM_F_NOTIFY)
2939 rt->rt_flags |= RTCF_NOTIFY;
2940
4feb88e5 2941 err = rt_fill_info(net, skb, NETLINK_CB(in_skb).pid, nlh->nlmsg_seq,
1937504d 2942 RTM_NEWROUTE, 0, 0);
d889ce3b
TG
2943 if (err <= 0)
2944 goto errout_free;
1da177e4 2945
1937504d 2946 err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).pid);
d889ce3b 2947errout:
2942e900 2948 return err;
1da177e4 2949
d889ce3b 2950errout_free:
1da177e4 2951 kfree_skb(skb);
d889ce3b 2952 goto errout;
1da177e4
LT
2953}
2954
2955int ip_rt_dump(struct sk_buff *skb, struct netlink_callback *cb)
2956{
2957 struct rtable *rt;
2958 int h, s_h;
2959 int idx, s_idx;
1937504d
DL
2960 struct net *net;
2961
3b1e0a65 2962 net = sock_net(skb->sk);
1da177e4
LT
2963
2964 s_h = cb->args[0];
d8c92830
ED
2965 if (s_h < 0)
2966 s_h = 0;
1da177e4 2967 s_idx = idx = cb->args[1];
a6272665
ED
2968 for (h = s_h; h <= rt_hash_mask; h++, s_idx = 0) {
2969 if (!rt_hash_table[h].chain)
2970 continue;
1da177e4
LT
2971 rcu_read_lock_bh();
2972 for (rt = rcu_dereference(rt_hash_table[h].chain), idx = 0; rt;
093c2ca4 2973 rt = rcu_dereference(rt->u.dst.rt_next), idx++) {
878628fb 2974 if (!net_eq(dev_net(rt->u.dst.dev), net) || idx < s_idx)
1da177e4 2975 continue;
e84f84f2 2976 if (rt_is_expired(rt))
29e75252 2977 continue;
1da177e4 2978 skb->dst = dst_clone(&rt->u.dst);
4feb88e5 2979 if (rt_fill_info(net, skb, NETLINK_CB(cb->skb).pid,
e905a9ed 2980 cb->nlh->nlmsg_seq, RTM_NEWROUTE,
b6544c0b 2981 1, NLM_F_MULTI) <= 0) {
1da177e4
LT
2982 dst_release(xchg(&skb->dst, NULL));
2983 rcu_read_unlock_bh();
2984 goto done;
2985 }
2986 dst_release(xchg(&skb->dst, NULL));
2987 }
2988 rcu_read_unlock_bh();
2989 }
2990
2991done:
2992 cb->args[0] = h;
2993 cb->args[1] = idx;
2994 return skb->len;
2995}
2996
2997void ip_rt_multicast_event(struct in_device *in_dev)
2998{
76e6ebfb 2999 rt_cache_flush(dev_net(in_dev->dev), 0);
1da177e4
LT
3000}
3001
3002#ifdef CONFIG_SYSCTL
81c684d1 3003static int ipv4_sysctl_rtcache_flush(ctl_table *__ctl, int write,
1da177e4
LT
3004 struct file *filp, void __user *buffer,
3005 size_t *lenp, loff_t *ppos)
3006{
3007 if (write) {
639e104f 3008 int flush_delay;
81c684d1 3009 ctl_table ctl;
39a23e75 3010 struct net *net;
639e104f 3011
81c684d1
DL
3012 memcpy(&ctl, __ctl, sizeof(ctl));
3013 ctl.data = &flush_delay;
3014 proc_dointvec(&ctl, write, filp, buffer, lenp, ppos);
639e104f 3015
81c684d1 3016 net = (struct net *)__ctl->extra1;
39a23e75 3017 rt_cache_flush(net, flush_delay);
1da177e4 3018 return 0;
e905a9ed 3019 }
1da177e4
LT
3020
3021 return -EINVAL;
3022}
3023
3024static int ipv4_sysctl_rtcache_flush_strategy(ctl_table *table,
1da177e4
LT
3025 void __user *oldval,
3026 size_t __user *oldlenp,
3027 void __user *newval,
1f29bcd7 3028 size_t newlen)
1da177e4
LT
3029{
3030 int delay;
39a23e75 3031 struct net *net;
1da177e4
LT
3032 if (newlen != sizeof(int))
3033 return -EINVAL;
3034 if (get_user(delay, (int __user *)newval))
e905a9ed 3035 return -EFAULT;
39a23e75
DL
3036 net = (struct net *)table->extra1;
3037 rt_cache_flush(net, delay);
1da177e4
LT
3038 return 0;
3039}
3040
c6153b5b
HX
3041static void rt_secret_reschedule(int old)
3042{
3043 struct net *net;
3044 int new = ip_rt_secret_interval;
3045 int diff = new - old;
3046
3047 if (!diff)
3048 return;
3049
3050 rtnl_lock();
3051 for_each_net(net) {
3052 int deleted = del_timer_sync(&net->ipv4.rt_secret_timer);
3053
3054 if (!new)
3055 continue;
3056
3057 if (deleted) {
3058 long time = net->ipv4.rt_secret_timer.expires - jiffies;
3059
3060 if (time <= 0 || (time += diff) <= 0)
3061 time = 0;
3062
3063 net->ipv4.rt_secret_timer.expires = time;
3064 } else
3065 net->ipv4.rt_secret_timer.expires = new;
3066
3067 net->ipv4.rt_secret_timer.expires += jiffies;
3068 add_timer(&net->ipv4.rt_secret_timer);
3069 }
3070 rtnl_unlock();
3071}
3072
3073static int ipv4_sysctl_rt_secret_interval(ctl_table *ctl, int write,
3074 struct file *filp,
3075 void __user *buffer, size_t *lenp,
3076 loff_t *ppos)
3077{
3078 int old = ip_rt_secret_interval;
3079 int ret = proc_dointvec_jiffies(ctl, write, filp, buffer, lenp, ppos);
3080
3081 rt_secret_reschedule(old);
3082
3083 return ret;
3084}
3085
3086static int ipv4_sysctl_rt_secret_interval_strategy(ctl_table *table,
c6153b5b
HX
3087 void __user *oldval,
3088 size_t __user *oldlenp,
3089 void __user *newval,
3090 size_t newlen)
3091{
3092 int old = ip_rt_secret_interval;
f221e726 3093 int ret = sysctl_jiffies(table, oldval, oldlenp, newval, newlen);
c6153b5b
HX
3094
3095 rt_secret_reschedule(old);
3096
3097 return ret;
3098}
3099
eeb61f71 3100static ctl_table ipv4_route_table[] = {
1da177e4
LT
3101 {
3102 .ctl_name = NET_IPV4_ROUTE_GC_THRESH,
3103 .procname = "gc_thresh",
3104 .data = &ipv4_dst_ops.gc_thresh,
3105 .maxlen = sizeof(int),
3106 .mode = 0644,
6d9f239a 3107 .proc_handler = proc_dointvec,
1da177e4
LT
3108 },
3109 {
3110 .ctl_name = NET_IPV4_ROUTE_MAX_SIZE,
3111 .procname = "max_size",
3112 .data = &ip_rt_max_size,
3113 .maxlen = sizeof(int),
3114 .mode = 0644,
6d9f239a 3115 .proc_handler = proc_dointvec,
1da177e4
LT
3116 },
3117 {
3118 /* Deprecated. Use gc_min_interval_ms */
e905a9ed 3119
1da177e4
LT
3120 .ctl_name = NET_IPV4_ROUTE_GC_MIN_INTERVAL,
3121 .procname = "gc_min_interval",
3122 .data = &ip_rt_gc_min_interval,
3123 .maxlen = sizeof(int),
3124 .mode = 0644,
6d9f239a
AD
3125 .proc_handler = proc_dointvec_jiffies,
3126 .strategy = sysctl_jiffies,
1da177e4
LT
3127 },
3128 {
3129 .ctl_name = NET_IPV4_ROUTE_GC_MIN_INTERVAL_MS,
3130 .procname = "gc_min_interval_ms",
3131 .data = &ip_rt_gc_min_interval,
3132 .maxlen = sizeof(int),
3133 .mode = 0644,
6d9f239a
AD
3134 .proc_handler = proc_dointvec_ms_jiffies,
3135 .strategy = sysctl_ms_jiffies,
1da177e4
LT
3136 },
3137 {
3138 .ctl_name = NET_IPV4_ROUTE_GC_TIMEOUT,
3139 .procname = "gc_timeout",
3140 .data = &ip_rt_gc_timeout,
3141 .maxlen = sizeof(int),
3142 .mode = 0644,
6d9f239a
AD
3143 .proc_handler = proc_dointvec_jiffies,
3144 .strategy = sysctl_jiffies,
1da177e4
LT
3145 },
3146 {
3147 .ctl_name = NET_IPV4_ROUTE_GC_INTERVAL,
3148 .procname = "gc_interval",
3149 .data = &ip_rt_gc_interval,
3150 .maxlen = sizeof(int),
3151 .mode = 0644,
6d9f239a
AD
3152 .proc_handler = proc_dointvec_jiffies,
3153 .strategy = sysctl_jiffies,
1da177e4
LT
3154 },
3155 {
3156 .ctl_name = NET_IPV4_ROUTE_REDIRECT_LOAD,
3157 .procname = "redirect_load",
3158 .data = &ip_rt_redirect_load,
3159 .maxlen = sizeof(int),
3160 .mode = 0644,
6d9f239a 3161 .proc_handler = proc_dointvec,
1da177e4
LT
3162 },
3163 {
3164 .ctl_name = NET_IPV4_ROUTE_REDIRECT_NUMBER,
3165 .procname = "redirect_number",
3166 .data = &ip_rt_redirect_number,
3167 .maxlen = sizeof(int),
3168 .mode = 0644,
6d9f239a 3169 .proc_handler = proc_dointvec,
1da177e4
LT
3170 },
3171 {
3172 .ctl_name = NET_IPV4_ROUTE_REDIRECT_SILENCE,
3173 .procname = "redirect_silence",
3174 .data = &ip_rt_redirect_silence,
3175 .maxlen = sizeof(int),
3176 .mode = 0644,
6d9f239a 3177 .proc_handler = proc_dointvec,
1da177e4
LT
3178 },
3179 {
3180 .ctl_name = NET_IPV4_ROUTE_ERROR_COST,
3181 .procname = "error_cost",
3182 .data = &ip_rt_error_cost,
3183 .maxlen = sizeof(int),
3184 .mode = 0644,
6d9f239a 3185 .proc_handler = proc_dointvec,
1da177e4
LT
3186 },
3187 {
3188 .ctl_name = NET_IPV4_ROUTE_ERROR_BURST,
3189 .procname = "error_burst",
3190 .data = &ip_rt_error_burst,
3191 .maxlen = sizeof(int),
3192 .mode = 0644,
6d9f239a 3193 .proc_handler = proc_dointvec,
1da177e4
LT
3194 },
3195 {
3196 .ctl_name = NET_IPV4_ROUTE_GC_ELASTICITY,
3197 .procname = "gc_elasticity",
3198 .data = &ip_rt_gc_elasticity,
3199 .maxlen = sizeof(int),
3200 .mode = 0644,
6d9f239a 3201 .proc_handler = proc_dointvec,
1da177e4
LT
3202 },
3203 {
3204 .ctl_name = NET_IPV4_ROUTE_MTU_EXPIRES,
3205 .procname = "mtu_expires",
3206 .data = &ip_rt_mtu_expires,
3207 .maxlen = sizeof(int),
3208 .mode = 0644,
6d9f239a
AD
3209 .proc_handler = proc_dointvec_jiffies,
3210 .strategy = sysctl_jiffies,
1da177e4
LT
3211 },
3212 {
3213 .ctl_name = NET_IPV4_ROUTE_MIN_PMTU,
3214 .procname = "min_pmtu",
3215 .data = &ip_rt_min_pmtu,
3216 .maxlen = sizeof(int),
3217 .mode = 0644,
6d9f239a 3218 .proc_handler = proc_dointvec,
1da177e4
LT
3219 },
3220 {
3221 .ctl_name = NET_IPV4_ROUTE_MIN_ADVMSS,
3222 .procname = "min_adv_mss",
3223 .data = &ip_rt_min_advmss,
3224 .maxlen = sizeof(int),
3225 .mode = 0644,
6d9f239a 3226 .proc_handler = proc_dointvec,
1da177e4
LT
3227 },
3228 {
3229 .ctl_name = NET_IPV4_ROUTE_SECRET_INTERVAL,
3230 .procname = "secret_interval",
3231 .data = &ip_rt_secret_interval,
3232 .maxlen = sizeof(int),
3233 .mode = 0644,
6d9f239a
AD
3234 .proc_handler = ipv4_sysctl_rt_secret_interval,
3235 .strategy = ipv4_sysctl_rt_secret_interval_strategy,
1da177e4
LT
3236 },
3237 { .ctl_name = 0 }
3238};
39a23e75 3239
2f4520d3
AV
3240static struct ctl_table empty[1];
3241
3242static struct ctl_table ipv4_skeleton[] =
3243{
3244 { .procname = "route", .ctl_name = NET_IPV4_ROUTE,
d994af0d 3245 .mode = 0555, .child = ipv4_route_table},
2f4520d3 3246 { .procname = "neigh", .ctl_name = NET_IPV4_NEIGH,
d994af0d 3247 .mode = 0555, .child = empty},
2f4520d3
AV
3248 { }
3249};
3250
3251static __net_initdata struct ctl_path ipv4_path[] = {
39a23e75
DL
3252 { .procname = "net", .ctl_name = CTL_NET, },
3253 { .procname = "ipv4", .ctl_name = NET_IPV4, },
39a23e75
DL
3254 { },
3255};
3256
39a23e75
DL
3257static struct ctl_table ipv4_route_flush_table[] = {
3258 {
3259 .ctl_name = NET_IPV4_ROUTE_FLUSH,
3260 .procname = "flush",
3261 .maxlen = sizeof(int),
3262 .mode = 0200,
6d9f239a
AD
3263 .proc_handler = ipv4_sysctl_rtcache_flush,
3264 .strategy = ipv4_sysctl_rtcache_flush_strategy,
39a23e75
DL
3265 },
3266 { .ctl_name = 0 },
3267};
3268
2f4520d3
AV
3269static __net_initdata struct ctl_path ipv4_route_path[] = {
3270 { .procname = "net", .ctl_name = CTL_NET, },
3271 { .procname = "ipv4", .ctl_name = NET_IPV4, },
3272 { .procname = "route", .ctl_name = NET_IPV4_ROUTE, },
3273 { },
3274};
3275
39a23e75
DL
3276static __net_init int sysctl_route_net_init(struct net *net)
3277{
3278 struct ctl_table *tbl;
3279
3280 tbl = ipv4_route_flush_table;
3281 if (net != &init_net) {
3282 tbl = kmemdup(tbl, sizeof(ipv4_route_flush_table), GFP_KERNEL);
3283 if (tbl == NULL)
3284 goto err_dup;
3285 }
3286 tbl[0].extra1 = net;
3287
3288 net->ipv4.route_hdr =
3289 register_net_sysctl_table(net, ipv4_route_path, tbl);
3290 if (net->ipv4.route_hdr == NULL)
3291 goto err_reg;
3292 return 0;
3293
3294err_reg:
3295 if (tbl != ipv4_route_flush_table)
3296 kfree(tbl);
3297err_dup:
3298 return -ENOMEM;
3299}
3300
3301static __net_exit void sysctl_route_net_exit(struct net *net)
3302{
3303 struct ctl_table *tbl;
3304
3305 tbl = net->ipv4.route_hdr->ctl_table_arg;
3306 unregister_net_sysctl_table(net->ipv4.route_hdr);
3307 BUG_ON(tbl == ipv4_route_flush_table);
3308 kfree(tbl);
3309}
3310
3311static __net_initdata struct pernet_operations sysctl_route_ops = {
3312 .init = sysctl_route_net_init,
3313 .exit = sysctl_route_net_exit,
3314};
1da177e4
LT
3315#endif
3316
9f5e97e5
DL
3317
3318static __net_init int rt_secret_timer_init(struct net *net)
3319{
e84f84f2
DL
3320 atomic_set(&net->ipv4.rt_genid,
3321 (int) ((num_physpages ^ (num_physpages>>8)) ^
3322 (jiffies ^ (jiffies >> 7))));
3323
9f5e97e5
DL
3324 net->ipv4.rt_secret_timer.function = rt_secret_rebuild;
3325 net->ipv4.rt_secret_timer.data = (unsigned long)net;
3326 init_timer_deferrable(&net->ipv4.rt_secret_timer);
3327
c6153b5b
HX
3328 if (ip_rt_secret_interval) {
3329 net->ipv4.rt_secret_timer.expires =
3330 jiffies + net_random() % ip_rt_secret_interval +
3331 ip_rt_secret_interval;
3332 add_timer(&net->ipv4.rt_secret_timer);
3333 }
9f5e97e5
DL
3334 return 0;
3335}
3336
3337static __net_exit void rt_secret_timer_exit(struct net *net)
3338{
3339 del_timer_sync(&net->ipv4.rt_secret_timer);
3340}
3341
3342static __net_initdata struct pernet_operations rt_secret_timer_ops = {
3343 .init = rt_secret_timer_init,
3344 .exit = rt_secret_timer_exit,
3345};
3346
3347
1da177e4 3348#ifdef CONFIG_NET_CLS_ROUTE
8dbde28d 3349struct ip_rt_acct *ip_rt_acct __read_mostly;
1da177e4
LT
3350#endif /* CONFIG_NET_CLS_ROUTE */
3351
3352static __initdata unsigned long rhash_entries;
3353static int __init set_rhash_entries(char *str)
3354{
3355 if (!str)
3356 return 0;
3357 rhash_entries = simple_strtoul(str, &str, 0);
3358 return 1;
3359}
3360__setup("rhash_entries=", set_rhash_entries);
3361
3362int __init ip_rt_init(void)
3363{
424c4b70 3364 int rc = 0;
1da177e4 3365
1da177e4 3366#ifdef CONFIG_NET_CLS_ROUTE
0dcec8c2 3367 ip_rt_acct = __alloc_percpu(256 * sizeof(struct ip_rt_acct), __alignof__(struct ip_rt_acct));
1da177e4
LT
3368 if (!ip_rt_acct)
3369 panic("IP: failed to allocate ip_rt_acct\n");
1da177e4
LT
3370#endif
3371
e5d679f3
AD
3372 ipv4_dst_ops.kmem_cachep =
3373 kmem_cache_create("ip_dst_cache", sizeof(struct rtable), 0,
20c2df83 3374 SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
1da177e4 3375
14e50e57
DM
3376 ipv4_dst_blackhole_ops.kmem_cachep = ipv4_dst_ops.kmem_cachep;
3377
424c4b70
ED
3378 rt_hash_table = (struct rt_hash_bucket *)
3379 alloc_large_system_hash("IP route cache",
3380 sizeof(struct rt_hash_bucket),
3381 rhash_entries,
3382 (num_physpages >= 128 * 1024) ?
18955cfc 3383 15 : 17,
8d1502de 3384 0,
424c4b70
ED
3385 &rt_hash_log,
3386 &rt_hash_mask,
c9503e0f 3387 rhash_entries ? 0 : 512 * 1024);
22c047cc
ED
3388 memset(rt_hash_table, 0, (rt_hash_mask + 1) * sizeof(struct rt_hash_bucket));
3389 rt_hash_lock_init();
1da177e4
LT
3390
3391 ipv4_dst_ops.gc_thresh = (rt_hash_mask + 1);
3392 ip_rt_max_size = (rt_hash_mask + 1) * 16;
3393
1da177e4
LT
3394 devinet_init();
3395 ip_fib_init();
3396
1da177e4
LT
3397 /* All the timers, started at system startup tend
3398 to synchronize. Perturb it a bit.
3399 */
39c90ece
ED
3400 schedule_delayed_work(&expires_work,
3401 net_random() % ip_rt_gc_interval + ip_rt_gc_interval);
1da177e4 3402
9f5e97e5
DL
3403 if (register_pernet_subsys(&rt_secret_timer_ops))
3404 printk(KERN_ERR "Unable to setup rt_secret_timer\n");
1da177e4 3405
73b38711 3406 if (ip_rt_proc_init())
107f1634 3407 printk(KERN_ERR "Unable to create route proc files\n");
1da177e4
LT
3408#ifdef CONFIG_XFRM
3409 xfrm_init();
3410 xfrm4_init();
3411#endif
63f3444f
TG
3412 rtnl_register(PF_INET, RTM_GETROUTE, inet_rtm_getroute, NULL);
3413
39a23e75
DL
3414#ifdef CONFIG_SYSCTL
3415 register_pernet_subsys(&sysctl_route_ops);
3416#endif
1da177e4
LT
3417 return rc;
3418}
3419
a1bc6eb4 3420#ifdef CONFIG_SYSCTL
eeb61f71
AV
3421/*
3422 * We really need to sanitize the damn ipv4 init order, then all
3423 * this nonsense will go away.
3424 */
3425void __init ip_static_sysctl_init(void)
3426{
2f4520d3 3427 register_sysctl_paths(ipv4_path, ipv4_skeleton);
eeb61f71 3428}
a1bc6eb4 3429#endif
eeb61f71 3430
1da177e4
LT
3431EXPORT_SYMBOL(__ip_select_ident);
3432EXPORT_SYMBOL(ip_route_input);
3433EXPORT_SYMBOL(ip_route_output_key);